Tx hash: b6e0488276e0390603d120058484f3466f536dbb82f0f39a1e0335ac6f827f91

Tx prefix hash: ba735a16d388b13558c000dc57a5344b8d08fe8816e2642a7271913dfddd5082
Tx public key: 6f96de578651823345179cf49fcb39e07d26031c058e6089d21909ff2f6adac2
Timestamp: 1512656307 Timestamp [UCT]: 2017-12-07 14:18:27 Age [y:d:h:m:s]: 08:146:08:56:59
Block: 56930 Fee: 0.000001 Tx size: 0.3721 kB
Tx version: 1 No of confirmations: 3928095 RingCT/type: no
Extra: 016f96de578651823345179cf49fcb39e07d26031c058e6089d21909ff2f6adac2

4 output(s) for total of 0.00 ETNX

stealth address amount amount idx
00: 5b42eef9304cd8af9b6ef8cb79de6eb8f6b8e605d6ad2897aa5372a7ab12a664 0.00 99986 of 1204163
01: 2245ef8021337fb7079b4951c2892af4ce38ed4dd7a194c9c522c12bd37f3cad 0.00 325672 of 1331469
02: 00d2448a31031d575086e9374732416d1857c44f69d9d022b5ae9d896cc0188c 0.00 125434 of 1488031
03: 2da62f435740671ded188c023949b187ad4577168315f3fc9579615a7a8b2eb8 0.00 325673 of 1331469

Check which outputs belong to given Electronero address and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Electronero in this transaction

Tx private key can be obtained using get_tx_key command in electronero-wallet-cli command line tool
Note: address and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2017-12-07 13:00:53 till 2017-12-07 15:07:56; resolution: 0.000519 days)

  • |________________________________________________________________________________*_________________________________________________________________________________________|
  • |__________________________________________________________________________________________*_______________________________________________________________________________|

2 inputs(s) for total of 0.00 etn

key image 00: dfe6edf94d6ec08b924974bb3e01e25276851430c926bda3255dce8c58ae2f2b amount: 0.00
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 33e9aed404e2387b70e85b044a981b122ca7ad5b5ea18899a0d2b2556ba7332e 00056902 1 5/7 2017-12-07 14:00:53 08:146:09:14:33
key image 01: 28653ec2a90f2614b5a9a41b1c893b01ff5ffa5ed6e2af21cbae58b85e631ed9 amount: 0.00
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 8081af8eced5974d4d2c0e74ff4810e24f8b7bba8da4543c920607376588143a 00056912 1 2/6 2017-12-07 14:07:56 08:146:09:07:30
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 20, "key_offsets": [ 109461 ], "k_image": "dfe6edf94d6ec08b924974bb3e01e25276851430c926bda3255dce8c58ae2f2b" } }, { "key": { "amount": 1000, "key_offsets": [ 1087480 ], "k_image": "28653ec2a90f2614b5a9a41b1c893b01ff5ffa5ed6e2af21cbae58b85e631ed9" } } ], "vout": [ { "amount": 9, "target": { "key": "5b42eef9304cd8af9b6ef8cb79de6eb8f6b8e605d6ad2897aa5372a7ab12a664" } }, { "amount": 500, "target": { "key": "2245ef8021337fb7079b4951c2892af4ce38ed4dd7a194c9c522c12bd37f3cad" } }, { "amount": 10, "target": { "key": "00d2448a31031d575086e9374732416d1857c44f69d9d022b5ae9d896cc0188c" } }, { "amount": 500, "target": { "key": "2da62f435740671ded188c023949b187ad4577168315f3fc9579615a7a8b2eb8" } } ], "extra": [ 1, 111, 150, 222, 87, 134, 81, 130, 51, 69, 23, 156, 244, 159, 203, 57, 224, 125, 38, 3, 28, 5, 142, 96, 137, 210, 25, 9, 255, 47, 106, 218, 194 ], "signatures": [ "cd400b5b8ed05192f17f0fe9eb4220e50d021c613fb840bc70573abd5854090b932ccd4018294cee42775cde4561c07e5bfe18f35cea0d0a9cda7b2a4a937d00", "dceb84fc6d81bc43631d70e7ea8be3e4b999948b9006aa56841b3edddef220020c1568701733d29f9c4319e22e0381b774b6a1fe3c6a2cb78fcab2135dde870e"] }


Less details