Tx hash: c804e61f7139a019fdf4fecba452d2043520d1eb833f54d23162589e3f03bee2

Tx prefix hash: 57c241101870f5dbef56d457bba3c4223ea2147950fc9647c17fe27eae6b8660
Tx public key: 34e132a64ed7354ac2ade08cd31e6aabe7ebad6835f3b0a4330394d62386489e
Timestamp: 1512715109 Timestamp [UCT]: 2017-12-08 06:38:29 Age [y:d:h:m:s]: 08:146:23:36:33
Block: 58112 Fee: 0.000001 Tx size: 0.3721 kB
Tx version: 1 No of confirmations: 3928719 RingCT/type: no
Extra: 0134e132a64ed7354ac2ade08cd31e6aabe7ebad6835f3b0a4330394d62386489e

4 output(s) for total of 0.00 ETNX

stealth address amount amount idx
00: 5a940f26ce5ba956a05c5722ad7207175b0f6893fa63dfc455f06a68ec585339 0.00 340347 of 1331469
01: 912c78e1d29a31a63710a2469cc5b87912f8ab2f23498bb62aad70afb5e6db38 0.00 153066 of 1027483
02: a507c7a09ed84bbadb480855fbfcbfb3f020f409fdd76d87f26170381233a0fb 0.00 686089 of 2003140
03: 9ebd37df7e02e9ae7c1f59b98596e40135906cad89ad85791a2d10158fa7118c 0.00 114739 of 1204163

Check which outputs belong to given Electronero address and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Electronero in this transaction

Tx private key can be obtained using get_tx_key command in electronero-wallet-cli command line tool
Note: address and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2017-12-08 05:19:06 till 2017-12-08 07:23:01; resolution: 0.000506 days)

  • |__________________________________________________________________________________*_______________________________________________________________________________________|
  • |________________________________________________________________________________________*_________________________________________________________________________________|

2 inputs(s) for total of 0.00 etn

key image 00: ee8cb05d13ec5480e70cc8a3b33a03bd7d85def822a3245170e2e6ffb8bf3cbb amount: 0.00
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: b3cfaed04facba1ee008add3928b771a445267510e9b9f7ad34e2a4931c1ea19 00058094 1 4/5 2017-12-08 06:19:06 08:146:23:55:56
key image 01: d6175f9cabf4c89ce9a3d0b38165cb8c04e1947352df4debfbcc6317b7adb2a2 amount: 0.00
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: fa9db7a85b589d813ea2e2a6400b9cb34a9cba1afbe23b7f460de22680fa263e 00058096 1 2/5 2017-12-08 06:23:01 08:146:23:52:01
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 90, "key_offsets": [ 208372 ], "k_image": "ee8cb05d13ec5480e70cc8a3b33a03bd7d85def822a3245170e2e6ffb8bf3cbb" } }, { "key": { "amount": 700, "key_offsets": [ 237958 ], "k_image": "d6175f9cabf4c89ce9a3d0b38165cb8c04e1947352df4debfbcc6317b7adb2a2" } } ], "vout": [ { "amount": 500, "target": { "key": "5a940f26ce5ba956a05c5722ad7207175b0f6893fa63dfc455f06a68ec585339" } }, { "amount": 80, "target": { "key": "912c78e1d29a31a63710a2469cc5b87912f8ab2f23498bb62aad70afb5e6db38" } }, { "amount": 200, "target": { "key": "a507c7a09ed84bbadb480855fbfcbfb3f020f409fdd76d87f26170381233a0fb" } }, { "amount": 9, "target": { "key": "9ebd37df7e02e9ae7c1f59b98596e40135906cad89ad85791a2d10158fa7118c" } } ], "extra": [ 1, 52, 225, 50, 166, 78, 215, 53, 74, 194, 173, 224, 140, 211, 30, 106, 171, 231, 235, 173, 104, 53, 243, 176, 164, 51, 3, 148, 214, 35, 134, 72, 158 ], "signatures": [ "f6e9c517a921367d5da9356ab2f351d4e4c6c3037150125c5db04edb401f5e0675bcf75001b550375893b3f2f75af5238e23a516214353f8413553a1dbd3e302", "3426b498d7a025cd19164ff2a86d834597f06f153a9711a70594c159cb5be50b92634d6effaf67b50301fd7163694aca8ab80c1b199f3e059d0e93ec46a3bb02"] }


Less details