Tx hash: d4efce16faca36b8776382759e9093ec6b093f1235f6e6cd945f525cd4bd9ad4

Tx prefix hash: 17531ac7f183e279b167c584bf14e4ea9b875425f792761db99c0b7ae58ee222
Tx public key: 4a815d074339e7d85b5164a1a4a7944ea3ede76145cb56994a54bf49f301ffee
Timestamp: 1513417343 Timestamp [UCT]: 2017-12-16 09:42:23 Age [y:d:h:m:s]: 08:142:11:11:55
Block: 69819 Fee: 0.000001 Tx size: 0.4053 kB
Tx version: 1 No of confirmations: 3922044 RingCT/type: no
Extra: 014a815d074339e7d85b5164a1a4a7944ea3ede76145cb56994a54bf49f301ffee

2 output(s) for total of 0.00 ETNX

stealth address amount amount idx
00: f432b3936b882722e8872eba99f5efdd84d4848bf307ea1a876045cbf94bd9b7 0.00 157909 of 862456
01: f0f962e1f5f995e79a8c2b5df8166f2cf9b5be6ce5a7c60a783f7f97dfc2354e 0.00 378848 of 1089390

Check which outputs belong to given Electronero address and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Electronero in this transaction

Tx private key can be obtained using get_tx_key command in electronero-wallet-cli command line tool
Note: address and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2017-12-16 08:21:05 till 2017-12-16 10:28:32; resolution: 0.000521 days)

  • |__________________________________________________________________________________________*_______________________________________________________________________________|
  • |________________________________________________________________________________*_________________________________________________________________________________________|
  • |__________________________________________________________________________________________*_______________________________________________________________________________|

3 inputs(s) for total of 0.00 etn

key image 00: 6cd375a678185c73cba03d7f725819cb39dfb964d9984a97b1c208926852d519 amount: 0.00
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: fb51d6a7db4c0db226c3595bb1a3fbe6b520e3dc666ea615bef83a8ddbbffafc 00069805 1 1/5 2017-12-16 09:28:32 08:142:11:25:46
key image 01: 17c36a2e836d6ec546e76a78c62b02e43b3371be148cc84f479375147c8bdbad amount: 0.00
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 35eff5ad60942351beed36b14026ab1f0a4da5f13c864614a4ea1e8b8fcbee38 00069800 1 12/6 2017-12-16 09:21:05 08:142:11:33:13
key image 02: 739cc1862af5a3abe25dfa4ae3c6bad3796bb31eaf91a46ac585efd05ceb25e1 amount: 0.00
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 4d4590bacd092a9d5c32b0a1cb8dedc7dedd00bce28b5e24247cb999f1a9f6f7 00069805 1 4/5 2017-12-16 09:28:32 08:142:11:25:46
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 9, "key_offsets": [ 252644 ], "k_image": "6cd375a678185c73cba03d7f725819cb39dfb964d9984a97b1c208926852d519" } }, { "key": { "amount": 200, "key_offsets": [ 833044 ], "k_image": "17c36a2e836d6ec546e76a78c62b02e43b3371be148cc84f479375147c8bdbad" } }, { "key": { "amount": 400, "key_offsets": [ 447108 ], "k_image": "739cc1862af5a3abe25dfa4ae3c6bad3796bb31eaf91a46ac585efd05ceb25e1" } } ], "vout": [ { "amount": 8, "target": { "key": "f432b3936b882722e8872eba99f5efdd84d4848bf307ea1a876045cbf94bd9b7" } }, { "amount": 600, "target": { "key": "f0f962e1f5f995e79a8c2b5df8166f2cf9b5be6ce5a7c60a783f7f97dfc2354e" } } ], "extra": [ 1, 74, 129, 93, 7, 67, 57, 231, 216, 91, 81, 100, 161, 164, 167, 148, 78, 163, 237, 231, 97, 69, 203, 86, 153, 74, 84, 191, 73, 243, 1, 255, 238 ], "signatures": [ "3c46e18ca1572ab18c9ecec4b7142464f9231dd3d0e882a8b46d6c82bbfc280d3b50ebb4b563f39a73605bb38718a57bfb6b7ce62fa9516f0464f28310d8ff04", "9c0dfe710f1d1b58e52e17922a337bbbb19d3e0e7cc8e885114f616a5172b50796a849209d0aab6fb8e3fb146d0fe9e86e2ee706b46c8d7698ff0b8db3f38203", "0ef43ee6d1e6864df9b9da022070390a4fe2c99ade9f9891a6b32f052b026a0697cebcfdccdbd46a5d78a2cf7c91a1462e1c97b5b4fc2a43befd86786379de02"] }


Less details