Tx hash: c1afbb41a69bb5ef9032c35cbcaeab67556e027b07a533f5a52f28ff975b7f48

Tx prefix hash: 6620dfb7ba5694d3b52bd1a3933fa2f9b9d07b60cf02d9eb6a5f7fb9592b50fd
Tx public key: 8272446f1e8f0f03b8fbaee5bab6e2d8cddbdd23ab00a3c513999996de8d7886
Timestamp: 1527132115 Timestamp [UCT]: 2018-05-24 03:21:55 Age [y:d:h:m:s]: 07:353:03:49:33
Block: 298676 Fee: 0.000001 Tx size: 0.4053 kB
Tx version: 1 No of confirmations: 3699344 RingCT/type: no
Extra: 018272446f1e8f0f03b8fbaee5bab6e2d8cddbdd23ab00a3c513999996de8d7886

2 output(s) for total of 0.00 ETNX

stealth address amount amount idx
00: 5edb189ed0794d3501b990236d7b60fb468fd64d06a1191e9adb1580714c4a1f 0.00 700211 of 730584
01: b9d2766b9e564f45daf738ea1a0f40c3fc0def126d2f3b3a70dfc9b2bef3d1b1 0.00 6863220 of 7257418

Check which outputs belong to given Electronero address and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Electronero in this transaction

Tx private key can be obtained using get_tx_key command in electronero-wallet-cli command line tool
Note: address and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2018-05-23 22:23:01 till 2018-05-24 00:23:01; resolution: 0.000490 days)

  • |_____________________________________________________________________________________*____________________________________________________________________________________|
  • |_____________________________________________________________________________________*____________________________________________________________________________________|
  • |_____________________________________________________________________________________*____________________________________________________________________________________|

3 inputs(s) for total of 0.00 etn

key image 00: 3837e22de6f93208175254f489170081720c5a9b1ad624d05cd1b3ca8053db12 amount: 0.00
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 6fe859ce04fdd8bb9fda4012b65914cb5fa015b6b04b1b665505f1f291020567 00298451 1 6/154 2018-05-23 23:23:01 07:353:07:48:27
key image 01: e4d7498db1ff6020ebf5a8c80d166f293a072769d70f1bbbd8657516798cab89 amount: 0.00
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 1513f0de836ed839192ecdc9df7c93f17fbcc75d22c3c9fcbc470c290bcffe6b 00298451 1 6/154 2018-05-23 23:23:01 07:353:07:48:27
key image 02: e3a25c1830bc122b32d09641bfeb682ec2a7cf230163aa65d28604d18614d497 amount: 0.00
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: f05647af95e4e85fa0068e05307e3d00b4c9a2cda0c65ea1ebf5128e3b9a0c1d 00298451 1 6/154 2018-05-23 23:23:01 07:353:07:48:27
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 1, "key_offsets": [ 392382 ], "k_image": "3837e22de6f93208175254f489170081720c5a9b1ad624d05cd1b3ca8053db12" } }, { "key": { "amount": 50, "key_offsets": [ 699663 ], "k_image": "e4d7498db1ff6020ebf5a8c80d166f293a072769d70f1bbbd8657516798cab89" } }, { "key": { "amount": 1000, "key_offsets": [ 6854689 ], "k_image": "e3a25c1830bc122b32d09641bfeb682ec2a7cf230163aa65d28604d18614d497" } } ], "vout": [ { "amount": 50, "target": { "key": "5edb189ed0794d3501b990236d7b60fb468fd64d06a1191e9adb1580714c4a1f" } }, { "amount": 1000, "target": { "key": "b9d2766b9e564f45daf738ea1a0f40c3fc0def126d2f3b3a70dfc9b2bef3d1b1" } } ], "extra": [ 1, 130, 114, 68, 111, 30, 143, 15, 3, 184, 251, 174, 229, 186, 182, 226, 216, 205, 219, 221, 35, 171, 0, 163, 197, 19, 153, 153, 150, 222, 141, 120, 134 ], "signatures": [ "06509d41e90a6f93da4b8bd26f33d52fb8cece9e66f669c3e2086b4deb9bb801851f7cfe08918ca61e82d39051a8bf8b00de2fafa3f8c412a6e32fe43b394800", "cf84ccb96312183d9001efece78a3ec9cbc2c7016409b73202e740ce78c7bc0f39be353651fc42cc3da8e9e60bde91db5454a1e2f042abab406c8dfb33cdbd02", "3fad977a6119f42ef8cd93737ebc12bd780241367abcf2be3f06b50a2027100c6156082a49909d7d258347fa25ea267391eb0b205120a4f4e33ba38fbece4007"] }


Less details