Tx hash: efae4dfe83b348005859ae6a4c4f52acc9248be2e915c6b99b22dffc52760428

Tx prefix hash: bf654508a03f48a648a7cf8de1a1b9ddc5607ed8ea97e0ed1e3953d03bcd8138
Tx public key: cf00019209702ee9e75e254dff74ca0c1a405076c8f9ead686c19ce827097c97
Timestamp: 1512757391 Timestamp [UCT]: 2017-12-08 18:23:11 Age [y:d:h:m:s]: 08:146:13:47:53
Block: 58871 Fee: 0.000001 Tx size: 0.4053 kB
Tx version: 1 No of confirmations: 3928059 RingCT/type: no
Extra: 01cf00019209702ee9e75e254dff74ca0c1a405076c8f9ead686c19ce827097c97

2 output(s) for total of 0.00 ETNX

stealth address amount amount idx
00: c03ebfc305b89feaf81f2c20d67076d7d10b8b9f620f2bb6b3b86a2e27b66d4b 0.00 245495 of 1012165
01: bb730feb94228669bb3db26a28c9a245357b393caea2acfa11d87fad791f6ee7 0.00 126640 of 1204163

Check which outputs belong to given Electronero address and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Electronero in this transaction

Tx private key can be obtained using get_tx_key command in electronero-wallet-cli command line tool
Note: address and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2017-12-08 17:02:01 till 2017-12-08 19:11:01; resolution: 0.000527 days)

  • |_________________________________________________________________________________*________________________________________________________________________________________|
  • |_______________________________________________________________________________*__________________________________________________________________________________________|
  • |___________________________________________________________________________________________*______________________________________________________________________________|

3 inputs(s) for total of 0.00 etn

key image 00: c30fd45f1e809e622b40d0ac576e8eb75c4c18210ae811264a4bd31fa0f445a9 amount: 0.00
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 71bf7194e21276996f222fd032e1bc7f712eecf89edf287afe0fa1ac936c9b38 00058855 1 2/4 2017-12-08 18:03:25 08:146:14:07:39
key image 01: 3c6fb1a0ec17c4d95c2e71696a71a8d2e1efac268118c77cd73b0d58f46f1e7c amount: 0.00
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 98cc56057bcc4a758b98e2349322852754e7cb420392456a8e1e794499e2ac52 00058853 1 5/5 2017-12-08 18:02:01 08:146:14:09:03
key image 02: 67b6813feb804f97f7ce735949332ab74ccaccf0365e3cfcf58d5ed933524f38 amount: 0.00
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 3e2eb0dccb64362351ea2b2608320426d6e00229ae1ff44f9abae7b4abcdf7f4 00058860 1 12/5 2017-12-08 18:11:01 08:146:14:00:03
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 500, "key_offsets": [ 349223 ], "k_image": "c30fd45f1e809e622b40d0ac576e8eb75c4c18210ae811264a4bd31fa0f445a9" } }, { "key": { "amount": 10, "key_offsets": [ 135990 ], "k_image": "3c6fb1a0ec17c4d95c2e71696a71a8d2e1efac268118c77cd73b0d58f46f1e7c" } }, { "key": { "amount": 200, "key_offsets": [ 695756 ], "k_image": "67b6813feb804f97f7ce735949332ab74ccaccf0365e3cfcf58d5ed933524f38" } } ], "vout": [ { "amount": 700, "target": { "key": "c03ebfc305b89feaf81f2c20d67076d7d10b8b9f620f2bb6b3b86a2e27b66d4b" } }, { "amount": 9, "target": { "key": "bb730feb94228669bb3db26a28c9a245357b393caea2acfa11d87fad791f6ee7" } } ], "extra": [ 1, 207, 0, 1, 146, 9, 112, 46, 233, 231, 94, 37, 77, 255, 116, 202, 12, 26, 64, 80, 118, 200, 249, 234, 214, 134, 193, 156, 232, 39, 9, 124, 151 ], "signatures": [ "a6ad2100b2b7ccd4f2dc2071618ebf39d13d842c0797d9c43dd2c01ac0a02008fac3dda336067f0cee994fffa327a4ac691c0780e9651800a8aa8d12b7897602", "c72c90c92132649635be978124d0b5474256f54aee20d5b6f5139047ba6d5d0818de5b3a28855e3c32363b21d0f00d870df7854ab1c313a797e5ed3bff65a803", "13b666dbccd14fd82ae1cee4257c78f836a520cc1b49e504b60d8acb48736208e104e0c7185765306f324a8ce2ee59c46267114c416fd1fb508a23cdbc95760d"] }


Less details