Tx hash: ed8090ef50a3cf051edbd740479beff535de967c9fb53a154d4bf52bde216cf3

Tx prefix hash: e72b8e347b9186aff47f193d15af7ca7f70e2a5e5d3c5c5c6a142232d1502e59
Tx public key: ba5c604b47f9fcfcca9fa922b34e88c079cde2fe9872a8342b85bca2b00bc6a9
Timestamp: 1525901140 Timestamp [UCT]: 2018-05-09 21:25:40 Age [y:d:h:m:s]: 08:000:10:29:33
Block: 277922 Fee: 0.000001 Tx size: 0.4365 kB
Tx version: 1 No of confirmations: 3717373 RingCT/type: no
Extra: 01ba5c604b47f9fcfcca9fa922b34e88c079cde2fe9872a8342b85bca2b00bc6a9

2 output(s) for total of 0.10 ETNX

stealth address amount amount idx
00: 5d571c061a3aa15e4fcbceadb8cb09c9df313ae16243050816d5ca682fd67ea6 0.10 310010 of 379867
01: d2da4c4d8a172ba45da04c74605c0ac7fe326bd426428183e8e1957de59cc497 0.00 545107 of 714591

Check which outputs belong to given Electronero address and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Electronero in this transaction

Tx private key can be obtained using get_tx_key command in electronero-wallet-cli command line tool
Note: address and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2018-01-06 13:58:59 till 2018-05-09 22:19:14; resolution: 0.725573 days)

  • |_________________________________________________________________________________________________________________________________________________________________________*|
  • |_*_______________________________________________________________________________________________________________________________________________________________________*|

2 inputs(s) for total of 0.10 etn

key image 00: dcd8e23921597537371f116c779bdce248d5fd95caab693e0fcc88f4f7346281 amount: 0.00
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 3fe02dedd443f9f420f54440204ed800c57f2114dfdd2f26b73c9feeb3243964 00277292 5 5/9 2018-05-09 07:56:25 08:000:23:58:48
- 01: 75c60fa2660eb8680db5b86b5dccfe47511b783f9f3c39b859923279e1e73b17 00277908 2 6/4 2018-05-09 21:19:14 08:000:10:35:59
key image 01: 06bcf546193299aa3441c85eec1b4a8a476f14663dc5d96d669e9dab6b5d4683 amount: 0.10
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 96d46463ac35d65edb4838f49580346b09405930b2962330c5a6e6fe9225af28 00100411 3 5/9 2018-01-06 14:58:59 08:123:16:56:14
- 01: 9ad1fca2f1fdb16891efdd70e4e726a1d2170c2282b15d6985e02740aac4f041 00277907 2 4/6 2018-05-09 21:17:49 08:000:10:37:24
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 7, "key_offsets": [ 741205, 2863 ], "k_image": "dcd8e23921597537371f116c779bdce248d5fd95caab693e0fcc88f4f7346281" } }, { "key": { "amount": 100000, "key_offsets": [ 140757, 169067 ], "k_image": "06bcf546193299aa3441c85eec1b4a8a476f14663dc5d96d669e9dab6b5d4683" } } ], "vout": [ { "amount": 100000, "target": { "key": "5d571c061a3aa15e4fcbceadb8cb09c9df313ae16243050816d5ca682fd67ea6" } }, { "amount": 6, "target": { "key": "d2da4c4d8a172ba45da04c74605c0ac7fe326bd426428183e8e1957de59cc497" } } ], "extra": [ 1, 186, 92, 96, 75, 71, 249, 252, 252, 202, 159, 169, 34, 179, 78, 136, 192, 121, 205, 226, 254, 152, 114, 168, 52, 43, 133, 188, 162, 176, 11, 198, 169 ], "signatures": [ "638f3f741d5c4d2247f867de628647db7c1d5bd0e45fee964550f7a680f87a0be01b2aeafb818e052189b2b97d9bd77a612025303d7d4839c130245c8b86dd0c779263489b5779333228410b49a264836d0955677a96c8788c1c743ffa8feb07a44aaa6406bafa419503d5fdedb22ba1f943e595b01a459135ae50a9cc7c2f09", "41715cdb8fc0099c335ed86d9583789f733d412b5c1732f1db6d37fb2a103d0921e19c2b1b22533ee59c2d6c4171d27ab5da89bda3a1b7314aac05acbb1743061d0fb221ecc580f2883b0eb2fe69ca9a56fffeb743287778684230f93d8c9706039454b3ef1cb01efbf691b347e6d7f7fc3b2048f1c5ceac1ea739afb6861b09"] }


Less details