Tx hash: dfafb1133d0a40d91f7f2b01cb846d5018d828552e62c4544fac38f54c0ff90a

Tx prefix hash: 2c648718df91321c2280bc6abec7225f5d786e91c8109158b295854ddc354a2b
Tx public key: dfd03859d5fee58c22d3911c463452e67ee8968f78d3a1e5535f66b90e7b3b01
Timestamp: 1512765107 Timestamp [UCT]: 2017-12-08 20:31:47 Age [y:d:h:m:s]: 08:150:22:25:32
Block: 58992 Fee: 0.000001 Tx size: 0.3721 kB
Tx version: 1 No of confirmations: 3934154 RingCT/type: no
Extra: 01dfd03859d5fee58c22d3911c463452e67ee8968f78d3a1e5535f66b90e7b3b01

4 output(s) for total of 0.00 ETNX

stealth address amount amount idx
00: eca310234d00b41acbbef92d33c8e3c8ff9a91f6b4e9e036f6fcc33ff50f0ab0 0.00 129010 of 1204163
01: 9485d309de59422aad6896c45d969da2135abca715bf803f634c4c5737dd1e5d 0.00 159206 of 1027483
02: 5e0bd6ab831183d90402ddb5703a9e286d8835c38b317587ed0e0aa53213f6d7 0.00 698259 of 2003140
03: 5914b2a4ca325e9e9b3a07081517fe10a244f02d746bd54082fce716a8ae69b4 0.00 351492 of 1331469

Check which outputs belong to given Electronero address and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Electronero in this transaction

Tx private key can be obtained using get_tx_key command in electronero-wallet-cli command line tool
Note: address and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2017-12-08 18:44:41 till 2017-12-08 20:51:18; resolution: 0.000517 days)

  • |_________________________________________________________________________________*________________________________________________________________________________________|
  • |_________________________________________________________________________________________*________________________________________________________________________________|

2 inputs(s) for total of 0.00 etn

key image 00: 363f201034bacbde006f74aca25d22691e97041ab08eaae59819d39c96a6c7ae amount: 0.00
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: ef6585dc3a5b6d81ef4f101fa1029fe6989fb9e8f34dd7cdff50222fcaf99c28 00058947 1 1/7 2017-12-08 19:44:41 08:150:23:12:38
key image 01: e56ffacacd96e2c7964d1ad8c842ab0ed7d9b5f5445c218807934ce9aec384eb amount: 0.00
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 3416c617d6e02669b5b632765800b0ea8eda6cc374939511e8f24e454cfed92e 00058957 1 1/6 2017-12-08 19:51:18 08:150:23:06:01
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 90, "key_offsets": [ 220293 ], "k_image": "363f201034bacbde006f74aca25d22691e97041ab08eaae59819d39c96a6c7ae" } }, { "key": { "amount": 700, "key_offsets": [ 246522 ], "k_image": "e56ffacacd96e2c7964d1ad8c842ab0ed7d9b5f5445c218807934ce9aec384eb" } } ], "vout": [ { "amount": 9, "target": { "key": "eca310234d00b41acbbef92d33c8e3c8ff9a91f6b4e9e036f6fcc33ff50f0ab0" } }, { "amount": 80, "target": { "key": "9485d309de59422aad6896c45d969da2135abca715bf803f634c4c5737dd1e5d" } }, { "amount": 200, "target": { "key": "5e0bd6ab831183d90402ddb5703a9e286d8835c38b317587ed0e0aa53213f6d7" } }, { "amount": 500, "target": { "key": "5914b2a4ca325e9e9b3a07081517fe10a244f02d746bd54082fce716a8ae69b4" } } ], "extra": [ 1, 223, 208, 56, 89, 213, 254, 229, 140, 34, 211, 145, 28, 70, 52, 82, 230, 126, 232, 150, 143, 120, 211, 161, 229, 83, 95, 102, 185, 14, 123, 59, 1 ], "signatures": [ "6bae55054850576eb17bbbb5410dfa3b991f4291e59b89a8e155cc817d89740fa772e57fb084ecc24ae59e9a3c90b693dd0c50e54928439fa53b3de249ddd901", "ee15c24c3a0f06e5c946b2672b4baadf09289aef6326386044362f72c365640e16a0a1c88187e23536c48e4aec052b361f36c5152824d2de5c48acacf3ef2009"] }


Less details