Tx hash: b9622932d422f8da95ab938298f0e3bea03ef88434af3a16b0bd5d4c27bd9236

Tx prefix hash: 32408863488d5470a2625dbe0fe741edd31e9b3645ff74ffd40ea75c49eb23b8
Tx public key: 6a9c89b45e88bf8e27841cbd65ac9f2d59a1b25ab07792d2a845c2ec4d30718c
Timestamp: 1513022580 Timestamp [UCT]: 2017-12-11 20:03:00 Age [y:d:h:m:s]: 08:140:10:44:01
Block: 63362 Fee: 0.000001 Tx size: 0.4053 kB
Tx version: 1 No of confirmations: 3919319 RingCT/type: no
Extra: 016a9c89b45e88bf8e27841cbd65ac9f2d59a1b25ab07792d2a845c2ec4d30718c

2 output(s) for total of 0.00 ETNX

stealth address amount amount idx
00: 69f48424cc6fafa7264f88cad521a3da7b3c06eddb3ca6c9e6927a23a4bd95fd 0.00 1334226 of 7257418
01: 647a48e40ddde28675944f6bbd8ca47cae4ad8accac68a37f670a97af7e6b021 0.00 57230 of 714591

Check which outputs belong to given Electronero address and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Electronero in this transaction

Tx private key can be obtained using get_tx_key command in electronero-wallet-cli command line tool
Note: address and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2017-12-11 18:20:34 till 2017-12-11 20:46:11; resolution: 0.000595 days)

  • |____________________________________________________________________________________________________*_____________________________________________________________________|
  • |______________________________________________________________________*___________________________________________________________________________________________________|
  • |________________________________________________________________________________________________*_________________________________________________________________________|

3 inputs(s) for total of 0.00 etn

key image 00: 156070a4081807286a603eab48b0625467338cd578c1837e2d88a31ce9899306 amount: 0.00
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 396855d46e171c7eaab2624d7ba15c9fa9261ecdead68def39c3609080757443 00063342 1 2/4 2017-12-11 19:46:11 08:140:11:00:50
key image 01: f02e25235e0bdc5a1ea18658a1b5b96e0411b5451e04f12baee93ce4aa7bbef6 amount: 0.00
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: ef8fdbfc807c1c8b406b8be3209e1643fcf9558117be21e2faa61df35711132c 00063310 1 2/2 2017-12-11 19:20:34 08:140:11:26:27
key image 02: 06f3e8b61e8942b27ba6445320cb844e00e072f723a4f16040b089acedc81e1f amount: 0.00
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: fb72d3a5ce8929d99805901ef414fafc9c23f754f26e07bbaf0f5b1de07feeea 00063339 1 1/6 2017-12-11 19:43:17 08:140:11:03:44
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 600, "key_offsets": [ 321899 ], "k_image": "156070a4081807286a603eab48b0625467338cd578c1837e2d88a31ce9899306" } }, { "key": { "amount": 7, "key_offsets": [ 122112 ], "k_image": "f02e25235e0bdc5a1ea18658a1b5b96e0411b5451e04f12baee93ce4aa7bbef6" } }, { "key": { "amount": 400, "key_offsets": [ 382917 ], "k_image": "06f3e8b61e8942b27ba6445320cb844e00e072f723a4f16040b089acedc81e1f" } } ], "vout": [ { "amount": 1000, "target": { "key": "69f48424cc6fafa7264f88cad521a3da7b3c06eddb3ca6c9e6927a23a4bd95fd" } }, { "amount": 6, "target": { "key": "647a48e40ddde28675944f6bbd8ca47cae4ad8accac68a37f670a97af7e6b021" } } ], "extra": [ 1, 106, 156, 137, 180, 94, 136, 191, 142, 39, 132, 28, 189, 101, 172, 159, 45, 89, 161, 178, 90, 176, 119, 146, 210, 168, 69, 194, 236, 77, 48, 113, 140 ], "signatures": [ "9c5725ea5bc4ce0325675ed73b3284c13c3ff8ce365cd4fc2ee3a1744119830a45f4e35191cac81f69dd7efc2833ab5ade8f1298389439c50a0da761e09c9300", "43a3b3be8c78e64f961c0e084a74706e569de8cbdea57ef92ab9c0439cdd2c08bc80cfce62aa3c4cabfe9b54aee375d6199b75e5387b44deb5b3a65a27affb00", "770ad143806fef7128ec42a8192259a70231b769c95dcb5dc79a026adba28509ac937352b7784e11d3ad04766922b8656d3cabf2dadce2cd3c96859a57ae7a06"] }


Less details