Tx hash: b59350698a03584357850e19c14a68859fb3e009c0dfa54fe10610e053a35436

Tx prefix hash: 2b433800532d486c041e6dd7aa99a9be87b0a6159af5fea08a566549793ef932
Tx public key: b554d04428196042eea204195462f29ce95120f547b2304b13b0797601e24239
Timestamp: 1526596450 Timestamp [UCT]: 2018-05-17 22:34:10 Age [y:d:h:m:s]: 07:361:20:21:28
Block: 289748 Fee: 0.000002 Tx size: 0.4375 kB
Tx version: 1 No of confirmations: 3711730 RingCT/type: no
Extra: 01b554d04428196042eea204195462f29ce95120f547b2304b13b0797601e24239

2 output(s) for total of 0.50 ETNX

stealth address amount amount idx
00: a834f148b847effba2ce0ff3a471ccdc3d5b049d28ab8537d5868d726d2caa74 0.40 157503 of 166298
01: 65558766083cb0a2383cc01bb4fe98fcabc8cce2e21451ab2187d755453b8743 0.10 357976 of 379867

Check which outputs belong to given Electronero address and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Electronero in this transaction

Tx private key can be obtained using get_tx_key command in electronero-wallet-cli command line tool
Note: address and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2018-05-16 21:12:31 till 2018-05-17 23:07:12; resolution: 0.006351 days)

  • |_______*_________________________________________________________________________________________________________________________________________________________*________|
  • |________________________________________________*__________________________________________________________________________________________________________________*______|

2 inputs(s) for total of 0.50 etn

key image 00: 6ee34d91bfb95d06316c3303521d0d08c97c7abf2f30c0968970c4225d6a4f17 amount: 0.00
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 8d639723f1c64fe9e2a6ecd42b31f35d2233cdafc7d84018254f3781ba2ecea6 00288300 1 3/204 2018-05-16 22:12:31 07:362:20:43:07
- 01: e54e3070f895d53e4fe3b4b617c000ee1fef34f182f88f42448d7653d2ec5657 00289727 2 9/6 2018-05-17 21:50:29 07:361:21:05:09
key image 01: a8d7a036a68c0db3f61c024f49e132b62c20f8fe19fb33e148e6fd9bd2e75f8d amount: 0.50
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 5440d6d0feca1484ac1b5d048ee89a71dca29f3602762021d591de21824dcc89 00288675 2 2/8 2018-05-17 04:30:30 07:362:14:25:08
- 01: b2073dd8790e639d82ea076b9ffe6f856b812876b30285fe26aee5568378089a 00289737 2 1/7 2018-05-17 22:07:12 07:361:20:48:26
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 2, "key_offsets": [ 522452, 10980 ], "k_image": "6ee34d91bfb95d06316c3303521d0d08c97c7abf2f30c0968970c4225d6a4f17" } }, { "key": { "amount": 500000, "key_offsets": [ 172578, 3004 ], "k_image": "a8d7a036a68c0db3f61c024f49e132b62c20f8fe19fb33e148e6fd9bd2e75f8d" } } ], "vout": [ { "amount": 400000, "target": { "key": "a834f148b847effba2ce0ff3a471ccdc3d5b049d28ab8537d5868d726d2caa74" } }, { "amount": 100000, "target": { "key": "65558766083cb0a2383cc01bb4fe98fcabc8cce2e21451ab2187d755453b8743" } } ], "extra": [ 1, 181, 84, 208, 68, 40, 25, 96, 66, 238, 162, 4, 25, 84, 98, 242, 156, 233, 81, 32, 245, 71, 178, 48, 75, 19, 176, 121, 118, 1, 226, 66, 57 ], "signatures": [ "a40815cae191a6cb98598249da17542714f841641b61092efe992cb2ba2b090f8bd32ae75eb88c5def2361816043b7d3b71e3f27ef1f6d021025430018e03a0b8717c95b491fd97435c4b8a71ea632fde275b1971a256a81372944e76e11f30d632f8f339aa5299bc047dc419b053f4494eb41213e94f684320c77aca3a4d703", "09a756e8b645f34b32657e2bbf653cab95637db1ec769a8d678801c24918bd0818884fcf84842a048ae29385ee663ff1dbab4b5794429568de791a741d2d530da6487c7540c55480a1a90b61ca55554a0a85502547cad0c8b8ffaeb52436a30c09e7e95f1265da0c7f51ace57057bd05da0e8e218c588af4d9da44551aa70a0b"] }


Less details