Tx hash: f052b85399e30e2b7c2fc7af83c27e78e9c1119ddf13a61f345c3701c402b285

Tx prefix hash: af804af0c6ba6b7f5196a72b2282b59a174f1993c285e8c0205344adaf269ccf
Tx public key: 1f59e15eaa435b0eb92b77e50612a927df72a9a9dc7a6f6a64342d09ccf55a7b
Timestamp: 1512731275 Timestamp [UCT]: 2017-12-08 11:07:55 Age [y:d:h:m:s]: 08:146:21:53:13
Block: 58415 Fee: 0.000001 Tx size: 0.3730 kB
Tx version: 1 No of confirmations: 3928566 RingCT/type: no
Extra: 011f59e15eaa435b0eb92b77e50612a927df72a9a9dc7a6f6a64342d09ccf55a7b

4 output(s) for total of 0.00 ETNX

stealth address amount amount idx
00: 545f89b46a2f6123fc24865d3eca3235612aa591f87a7011c62303c38c92f81a 0.00 275626 of 1089390
01: f034e9dc924833a0136f102b87600a549abfdee932c29d3283f335e16db64e69 0.00 332529 of 1279092
02: 5019472922a7da84b4c26490bfc8bbfa41a3cd7f4fd8d690421386221b7942d5 0.00 409601 of 1640330
03: 06494027dadc44db5f0523d707f469d7481e5fcc1526dc5a1c2d6bb76dd46284 0.00 30632 of 613163

Check which outputs belong to given Electronero address and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Electronero in this transaction

Tx private key can be obtained using get_tx_key command in electronero-wallet-cli command line tool
Note: address and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2017-12-08 09:47:48 till 2017-12-08 11:49:42; resolution: 0.000498 days)

  • |______________________________________________________________________________________*___________________________________________________________________________________|
  • |____________________________________________________________________________________*_____________________________________________________________________________________|

2 inputs(s) for total of 0.00 etn

key image 00: 78aea1829d003022be9ff8ddb938aad2730ca07ffa2c7ba05f624a43ed61888f amount: 0.00
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 006817ed8c5755696d580e89670bafed7720268a901f6becfc414d1a156a79ad 00058398 1 3/5 2017-12-08 10:49:42 08:146:22:11:26
key image 01: e3bec66edc61930c4538da99357f2872c364345617098fdd2c1085150deb2017 amount: 0.00
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 213b9e28ce6a40f2de7b739113980d5e2a028a0cea8d79b59cc1af14b3e46d36 00058397 1 1/6 2017-12-08 10:47:48 08:146:22:13:20
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 4, "key_offsets": [ 34373 ], "k_image": "78aea1829d003022be9ff8ddb938aad2730ca07ffa2c7ba05f624a43ed61888f" } }, { "key": { "amount": 3000, "key_offsets": [ 200870 ], "k_image": "e3bec66edc61930c4538da99357f2872c364345617098fdd2c1085150deb2017" } } ], "vout": [ { "amount": 600, "target": { "key": "545f89b46a2f6123fc24865d3eca3235612aa591f87a7011c62303c38c92f81a" } }, { "amount": 400, "target": { "key": "f034e9dc924833a0136f102b87600a549abfdee932c29d3283f335e16db64e69" } }, { "amount": 2000, "target": { "key": "5019472922a7da84b4c26490bfc8bbfa41a3cd7f4fd8d690421386221b7942d5" } }, { "amount": 3, "target": { "key": "06494027dadc44db5f0523d707f469d7481e5fcc1526dc5a1c2d6bb76dd46284" } } ], "extra": [ 1, 31, 89, 225, 94, 170, 67, 91, 14, 185, 43, 119, 229, 6, 18, 169, 39, 223, 114, 169, 169, 220, 122, 111, 106, 100, 52, 45, 9, 204, 245, 90, 123 ], "signatures": [ "5b86a07b9a899c386cebec490da48de4a43cc5bc831348278b08e6152bfba00f644a29a338833b79d0116cf1eb7edd095b2f6746d835eff6ac99f05988da7601", "1b076faffa1471ed02f35372b6358a3c45b44235d69430b1b0cae4abad09330b9de9b4ea8779e3c8a1c2456e051cfa964986318f2fd81a48cf430bdce2181101"] }


Less details