Tx hash: e0a88137cf1524da6e97fee127c4a1e06943546ab62a48a5c1f8ae8274199ca1

Tx prefix hash: 6a70a994d4764515603045a531cf84e1bf89470dcd939369c7aa9730a84e965e
Tx public key: 9694fec1a065e7b92bd5612ac75da5e13cd645c11eda224211ebc875ee6b22c9
Timestamp: 1512825704 Timestamp [UCT]: 2017-12-09 13:21:44 Age [y:d:h:m:s]: 08:150:16:59:15
Block: 60074 Fee: 0.000001 Tx size: 0.4053 kB
Tx version: 1 No of confirmations: 3933736 RingCT/type: no
Extra: 019694fec1a065e7b92bd5612ac75da5e13cd645c11eda224211ebc875ee6b22c9

2 output(s) for total of 0.00 ETNX

stealth address amount amount idx
00: 8ee52f534550896aa01b2770f7f4c370a81b7442a17bc57a705261f49c87cde6 0.00 108952 of 918752
01: 402d6d3d1fcafe8523d7411af7f406d6144adaf471fbeb42cd182dc2d0840331 0.00 258084 of 1012165

Check which outputs belong to given Electronero address and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Electronero in this transaction

Tx private key can be obtained using get_tx_key command in electronero-wallet-cli command line tool
Note: address and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2017-12-09 10:55:40 till 2017-12-09 13:11:22; resolution: 0.000554 days)

  • |___________________________________________________________________________*______________________________________________________________________________________________|
  • |___________________________________________________________________________________________*______________________________________________________________________________|
  • |_______________________________________________________________________________________________*__________________________________________________________________________|

3 inputs(s) for total of 0.00 etn

key image 00: 842b7c0bf7b7891e3fa9a96194585940e99832efaaff4a9dc272a73b28d4bd61 amount: 0.00
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 06a8d88eda102b52e20cdcec369bee6a3cf89344f6916ebf53f780d996699917 00059992 1 4/6 2017-12-09 11:55:40 08:150:18:25:19
key image 01: 868ec7b4c487cfce4a8bfa4721512c2076b633fb207ec6e84a237c43465c6621 amount: 0.00
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: ed9f38486fc3071160433188952a7ceeabbf6855174e2b1301e38a9045f67ada 00060007 1 5/6 2017-12-09 12:08:44 08:150:18:12:15
key image 02: 8fbf31346de2292793cd5da3802637217cbdac9a234490f986d8df24314c4509 amount: 0.00
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 53a4bca0d97f77ff69b44ff4b39be7ca2158ed59f14a144600dc9cc35048dad0 00060010 1 5/7 2017-12-09 12:11:22 08:150:18:09:37
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 500, "key_offsets": [ 364525 ], "k_image": "842b7c0bf7b7891e3fa9a96194585940e99832efaaff4a9dc272a73b28d4bd61" } }, { "key": { "amount": 8, "key_offsets": [ 102112 ], "k_image": "868ec7b4c487cfce4a8bfa4721512c2076b633fb207ec6e84a237c43465c6621" } }, { "key": { "amount": 200, "key_offsets": [ 713253 ], "k_image": "8fbf31346de2292793cd5da3802637217cbdac9a234490f986d8df24314c4509" } } ], "vout": [ { "amount": 7, "target": { "key": "8ee52f534550896aa01b2770f7f4c370a81b7442a17bc57a705261f49c87cde6" } }, { "amount": 700, "target": { "key": "402d6d3d1fcafe8523d7411af7f406d6144adaf471fbeb42cd182dc2d0840331" } } ], "extra": [ 1, 150, 148, 254, 193, 160, 101, 231, 185, 43, 213, 97, 42, 199, 93, 165, 225, 60, 214, 69, 193, 30, 218, 34, 66, 17, 235, 200, 117, 238, 107, 34, 201 ], "signatures": [ "52a60dc2058a6ab589fcb77e0b5f7dbb44ae8e50793abc1e5b3e04dfe1c30a04e7bc2a760a7c172d79bee3a82386cc9d52bb366e9655188f8eecb33763146308", "6ed0087465230af796f70de9685699d1fb381947c7281f979e352d59b9992206cf9c4b18f3ff7cb4e8c3a67c6a36da2646ac71807fa5029ed20e425fa9cacd02", "6f1cc36d10e27d99f8cee711df7082a63fbb5e74fbfc2bba65774ce9078228009d170620493ff3de744dbe60857602e95d7aeec03019b9e248f9ea4dc1ca5007"] }


Less details