Tx hash: 130c264ca661de3fa7579defb6c64121f03df361c2e6df00024808af0a8f859b

Tx prefix hash: cfad62cf8dcd4bd5152241364ecbb8c7232936c476a90b3d82708292c385e101
Tx public key: bd208e0c70b8aa5afa69d01e2250b5441aceb2f8e9c1062ef7065dcdcff8e3f5
Timestamp: 1512320428 Timestamp [UCT]: 2017-12-03 17:00:28 Age [y:d:h:m:s]: 08:149:02:11:47
Block: 51901 Fee: 0.000001 Tx size: 0.3711 kB
Tx version: 1 No of confirmations: 3931486 RingCT/type: no
Extra: 01bd208e0c70b8aa5afa69d01e2250b5441aceb2f8e9c1062ef7065dcdcff8e3f5

4 output(s) for total of 0.00 ETNX

stealth address amount amount idx
00: 9dd221bbfc4cc8da08ce6b1d7858f67fd0dd432287ee27314e30d0077155da06 0.00 66688 of 1204163
01: 9504f3a9017e68d8d37b2b9f015057ca7f252780400a15101c2b4320ff07ff01 0.00 413795 of 2212696
02: 41bf785918923cdf9539ae2fbbf51c6ff2c8ba93359c4ccc82e5c575a1f3ecf6 0.00 120501 of 1027483
03: 26259cf87293ca89a9ced41dc99c710f00d8cadeb9ad5d28f512ad0f8e09b194 0.00 177954 of 968489

Check which outputs belong to given Electronero address and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Electronero in this transaction

Tx private key can be obtained using get_tx_key command in electronero-wallet-cli command line tool
Note: address and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2017-12-03 15:38:27 till 2017-12-03 17:43:49; resolution: 0.000512 days)

  • |_________________________________________________________________________________________*________________________________________________________________________________|
  • |_________________________________________________________________________________*________________________________________________________________________________________|

2 inputs(s) for total of 0.00 etn

key image 00: bd0d985d39f54e9f404009ce4115bc3c815d6bc8539e3850133580670e00f390 amount: 0.00
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 9d077ce7618382fc30d86fd70c7c9698e4b0eb5778469b6b11fe1857ba5d87ad 00051882 1 1/6 2017-12-03 16:43:49 08:149:02:28:26
key image 01: 64fcc85144b80cfc3577eca3abce7a129997e2d2c2addbc48fb7ce74cce6d7c0 amount: 0.00
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: a11d0b0cc40ed2f0318f1dabe0611230e4567e695cdbf6966dbdd944c7a7be6a 00051877 0 0/6 2017-12-03 16:38:27 08:149:02:33:48
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 90, "key_offsets": [ 155361 ], "k_image": "bd0d985d39f54e9f404009ce4115bc3c815d6bc8539e3850133580670e00f390" } }, { "key": { "amount": 900, "key_offsets": [ 177001 ], "k_image": "64fcc85144b80cfc3577eca3abce7a129997e2d2c2addbc48fb7ce74cce6d7c0" } } ], "vout": [ { "amount": 9, "target": { "key": "9dd221bbfc4cc8da08ce6b1d7858f67fd0dd432287ee27314e30d0077155da06" } }, { "amount": 100, "target": { "key": "9504f3a9017e68d8d37b2b9f015057ca7f252780400a15101c2b4320ff07ff01" } }, { "amount": 80, "target": { "key": "41bf785918923cdf9539ae2fbbf51c6ff2c8ba93359c4ccc82e5c575a1f3ecf6" } }, { "amount": 800, "target": { "key": "26259cf87293ca89a9ced41dc99c710f00d8cadeb9ad5d28f512ad0f8e09b194" } } ], "extra": [ 1, 189, 32, 142, 12, 112, 184, 170, 90, 250, 105, 208, 30, 34, 80, 181, 68, 26, 206, 178, 248, 233, 193, 6, 46, 247, 6, 93, 205, 207, 248, 227, 245 ], "signatures": [ "cad8122d0a62f79037a5a7a370558fef9ccc0bfbce6ad9a5e393901def637e02146c8b887cd284acc30f5b53521c1c285c57c1a8b9f50f9f41560b1c044ccf02", "ba22129f6dcb252cb337c35b09e30698f11bdf1b0a0496c50d819f2859faf5080f7d8b97ed7dcdae0baa6dcfe9280724c8c2abd9fbcd34ad5f2b430700c7b60a"] }


Less details