Tx hash: ec594c43b4c9b85e8d0569a219861971da0c1050a1a415827a604935d73e38e3

Tx prefix hash: d673378b063e04dece958a134989cfe700faec6d444dcc8e50c46a9a6b768ed3
Tx public key: 35f7d6fc15564820613da02feaf8a3e996460700711d84b413fa877d33eb787e
Timestamp: 1514741453 Timestamp [UCT]: 2017-12-31 17:30:53 Age [y:d:h:m:s]: 08:124:16:32:37
Block: 91945 Fee: 0.000002 Tx size: 0.4062 kB
Tx version: 1 No of confirmations: 3896499 RingCT/type: no
Extra: 0135f7d6fc15564820613da02feaf8a3e996460700711d84b413fa877d33eb787e

2 output(s) for total of 0.00 ETNX

stealth address amount amount idx
00: 5b244f2c70ef0bdcaee12d2c400b51932526912b880e3a00076cddea626913f2 0.00 465955 of 1012165
01: ab546228341b6bf08292ce83547c6c6c9c53ad7c60c067cf2422f017dd6ba5f7 0.00 1035252 of 2003140

Check which outputs belong to given Electronero address and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Electronero in this transaction

Tx private key can be obtained using get_tx_key command in electronero-wallet-cli command line tool
Note: address and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2017-12-31 15:49:08 till 2017-12-31 18:04:20; resolution: 0.000552 days)

  • |______________________________________________________________________________________________*___________________________________________________________________________|
  • |____________________________________________________________________________*_____________________________________________________________________________________________|
  • |______________________________________________________________________________________________*___________________________________________________________________________|

3 inputs(s) for total of 0.00 etn

key image 00: 52f6e5d039a520199e3a8db1a4510c46e8e09e479bf2a9beee1231e00191a83e amount: 0.00
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 922f2d50bf9ea85ccf1bb6d5df1f9d8e62ae86c13be3b90419f4c6782e87eb56 00091924 1 8/6 2017-12-31 17:04:20 08:124:16:59:10
key image 01: 7dbc1babebc5217e9a1e0db0be2a64a063f80c94f558c4a3e9823dfeedf4577d amount: 0.00
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: e0378b5a548e26e36b19b1a16ce977a39becf201836d653d982aabd5c0fa74da 00091910 1 2/6 2017-12-31 16:49:08 08:124:17:14:22
key image 02: 78b1c9753f75954ae5f2c1acda87d95a4b05f29f7d1f844d840d126c589f98fe amount: 0.00
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 80b641afbf762d3dd16be44fea093858885efb81f562a15e0879782739e679d7 00091924 1 1/5 2017-12-31 17:04:20 08:124:16:59:10
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 2, "key_offsets": [ 98482 ], "k_image": "52f6e5d039a520199e3a8db1a4510c46e8e09e479bf2a9beee1231e00191a83e" } }, { "key": { "amount": 500, "key_offsets": [ 617016 ], "k_image": "7dbc1babebc5217e9a1e0db0be2a64a063f80c94f558c4a3e9823dfeedf4577d" } }, { "key": { "amount": 400, "key_offsets": [ 601798 ], "k_image": "78b1c9753f75954ae5f2c1acda87d95a4b05f29f7d1f844d840d126c589f98fe" } } ], "vout": [ { "amount": 700, "target": { "key": "5b244f2c70ef0bdcaee12d2c400b51932526912b880e3a00076cddea626913f2" } }, { "amount": 200, "target": { "key": "ab546228341b6bf08292ce83547c6c6c9c53ad7c60c067cf2422f017dd6ba5f7" } } ], "extra": [ 1, 53, 247, 214, 252, 21, 86, 72, 32, 97, 61, 160, 47, 234, 248, 163, 233, 150, 70, 7, 0, 113, 29, 132, 180, 19, 250, 135, 125, 51, 235, 120, 126 ], "signatures": [ "8b02e825c3ca664e9b734a71ed1c0f409f3c706ee8559027442af43616e6f60274fa81691999ddc92711c55783c1ffa65ce7d5db8d6d70181ce41c6d831c1b0f", "32e366c25fff4e00b05157ff2d9a3d1849b11eb96f8c13d102abbf038ef7570a3d0c6d9320b9c725441ba2f2b269a9d6f3c30e2f3d0e7397e9b9b17ed2e5f302", "612456bc93c9dd9c14940152d2b605929e4edd66d7428662c6d110a377dd0409231e3ccab23c083c69d982d9a57878ce9062f64b0d4e5d4d9b273ac3aa207a05"] }


Less details