Tx hash: fcd215809b329dbe4de55eae0d9579307af358a4913b915668892b5d6aee651e

Tx prefix hash: 29b90bf9e58e2666857c335c524778ec4baafebaa5b68ad8252923e1c18e750e
Tx public key: 9d5ca2d4eacdb7d3bae2f76b17e33ef831777bab9eb67761c35c72193ef50c3e
Timestamp: 1512774103 Timestamp [UCT]: 2017-12-08 23:01:43 Age [y:d:h:m:s]: 08:147:09:34:07
Block: 59152 Fee: 0.000001 Tx size: 0.3047 kB
Tx version: 1 No of confirmations: 3929200 RingCT/type: no
Extra: 019d5ca2d4eacdb7d3bae2f76b17e33ef831777bab9eb67761c35c72193ef50c3e

2 output(s) for total of 0.00 ETNX

stealth address amount amount idx
00: 29631bf52f66beb6143421cb2d799fd468e3f8b3dda502635fae89ce57fc2ed1 0.00 354660 of 1331469
01: f0c5c3f83ebadac2ec140d04185e6388174c068cd0da319f0a1984c7b5afe83d 0.00 39878 of 1013510

Check which outputs belong to given Electronero address and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Electronero in this transaction

Tx private key can be obtained using get_tx_key command in electronero-wallet-cli command line tool
Note: address and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2017-12-08 21:33:42 till 2017-12-08 23:48:51; resolution: 0.000552 days)

  • |____________________________________________________________________________*_____________________________________________________________________________________________|
  • |______________________________________________________________________________________________*___________________________________________________________________________|

2 inputs(s) for total of 0.00 etn

key image 00: e37432cb5386829a820e18fe5195aa23a3e82318da91aba262b59aa3a51325b3 amount: 0.00
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: f8e54e9a4c4761d124a68d2f48cff50999a7e0cb6f2e535f1dd994b8d03482b7 00059118 1 7/5 2017-12-08 22:33:42 08:147:10:02:08
key image 01: 86ad52c660f58da98c33e74c613eb6448625e9a13e52a7a864b5e2e16304c192 amount: 0.00
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: e513a3aeb7c9d8d8e7c914912e5e6864c29c415617541baa08b1298c3e3f5c85 00059137 1 5/5 2017-12-08 22:48:51 08:147:09:46:59
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 500, "key_offsets": [ 354105 ], "k_image": "e37432cb5386829a820e18fe5195aa23a3e82318da91aba262b59aa3a51325b3" } }, { "key": { "amount": 6, "key_offsets": [ 45584 ], "k_image": "86ad52c660f58da98c33e74c613eb6448625e9a13e52a7a864b5e2e16304c192" } } ], "vout": [ { "amount": 500, "target": { "key": "29631bf52f66beb6143421cb2d799fd468e3f8b3dda502635fae89ce57fc2ed1" } }, { "amount": 5, "target": { "key": "f0c5c3f83ebadac2ec140d04185e6388174c068cd0da319f0a1984c7b5afe83d" } } ], "extra": [ 1, 157, 92, 162, 212, 234, 205, 183, 211, 186, 226, 247, 107, 23, 227, 62, 248, 49, 119, 123, 171, 158, 182, 119, 97, 195, 92, 114, 25, 62, 245, 12, 62 ], "signatures": [ "b5ad663fc326a97f874a72e4eaf11b94ad63de227fc58da5d7cd6ab6f786ec09c2d47025b8571957382bbb0103d10c989f3e15c95cd6133cf459f9eec8751f03", "dec8713537d000dc4becc94f6d4d261e8182b70e306dcce313bd7c14d01e9b054e9ab412e980fc54f147932295dac53b4112079a0b8a9d82a96977384074c80a"] }


Less details