Tx hash: b90cf9acad3431fc770850d6f140cead169664308e95e3237d63ea23d75044c5

Tx prefix hash: c19e76e7064edb8c91f04188f97551c718a7e4d51b9616a39a2826c6ceeaca20
Tx public key: 518454acccfd89314924a8024b242664adbdd466374b8e4abe1a4a75afc9ebef
Timestamp: 1513622694 Timestamp [UCT]: 2017-12-18 18:44:54 Age [y:d:h:m:s]: 08:136:17:41:19
Block: 73219 Fee: 0.000001 Tx size: 0.3721 kB
Tx version: 1 No of confirmations: 3913966 RingCT/type: no
Extra: 01518454acccfd89314924a8024b242664adbdd466374b8e4abe1a4a75afc9ebef

4 output(s) for total of 0.00 ETNX

stealth address amount amount idx
00: a6e31c7095918bd892dea16edb4fb045f714fc652e009a726179b450c07003cc 0.00 281338 of 1204163
01: cdbf42760be2f0509f0a886ffbcf88e9da36534c422b2e1a7901c1ca097f9b6e 0.00 381574 of 1393312
02: ef3122da5c500b0607fe4238989e4d9a62ad4178cac4ab235fa5fb0665e8248e 0.00 697338 of 2212696
03: 1ac336bf262a250bcbb5adcc76f50a14760dfda17daaf4856c9a2b03e7b48052 0.00 491310 of 1331469

Check which outputs belong to given Electronero address and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Electronero in this transaction

Tx private key can be obtained using get_tx_key command in electronero-wallet-cli command line tool
Note: address and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2017-12-18 17:27:39 till 2017-12-18 19:31:53; resolution: 0.000507 days)

  • |__________________________________________________________________________________*_______________________________________________________________________________________|
  • |________________________________________________________________________________________*_________________________________________________________________________________|

2 inputs(s) for total of 0.00 etn

key image 00: dc673d7c76dc1a837358e633c91df3014bed386ff762d8c2516d12735cd3aa11 amount: 0.00
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 8f29f82281ccaac0c931f71f97f028f6295273eaa47b851a3a62e7be9c1da285 00073203 1 5/4 2017-12-18 18:27:39 08:136:17:58:34
key image 01: 085dbbf4489c0cfbb7a17a66498bf7f038e8d0cb136e39727eec26cb98ad454b amount: 0.00
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 600df499c5e2e3bd3a043c3097340e564d01b8678f1d9acd9a84ec0df56675d0 00073205 1 1/5 2017-12-18 18:31:53 08:136:17:54:20
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 400, "key_offsets": [ 476431 ], "k_image": "dc673d7c76dc1a837358e633c91df3014bed386ff762d8c2516d12735cd3aa11" } }, { "key": { "amount": 300, "key_offsets": [ 583745 ], "k_image": "085dbbf4489c0cfbb7a17a66498bf7f038e8d0cb136e39727eec26cb98ad454b" } } ], "vout": [ { "amount": 9, "target": { "key": "a6e31c7095918bd892dea16edb4fb045f714fc652e009a726179b450c07003cc" } }, { "amount": 90, "target": { "key": "cdbf42760be2f0509f0a886ffbcf88e9da36534c422b2e1a7901c1ca097f9b6e" } }, { "amount": 100, "target": { "key": "ef3122da5c500b0607fe4238989e4d9a62ad4178cac4ab235fa5fb0665e8248e" } }, { "amount": 500, "target": { "key": "1ac336bf262a250bcbb5adcc76f50a14760dfda17daaf4856c9a2b03e7b48052" } } ], "extra": [ 1, 81, 132, 84, 172, 204, 253, 137, 49, 73, 36, 168, 2, 75, 36, 38, 100, 173, 189, 212, 102, 55, 75, 142, 74, 190, 26, 74, 117, 175, 201, 235, 239 ], "signatures": [ "1dca24fa41ace9aa1e592abc0ca3552fb964ec551463211d087f3cfbb6929e02c525cd1cd64c41528e928806d40ed3da7b62972909d953913d9ab6e15cd6720a", "655350e4e440ef781403b8e5683605472794fb8444d46438250add81a14492082572312d940611142f4f483515d50e14f1fec6a98563aa3d08a69f7df6047b0f"] }


Less details