Tx hash: c130137758eaeb61e5337814295a65665e283c351258c539a9bd48105c019cb6

Tx prefix hash: cc50ada5e747362dcb79248d4f375ceda644ea31f6d1183383b2f8506c3ad00c
Tx public key: 0ab0d2bbaf9a53005a84ce7fa2bf48dd5cc779cdc8957756dbbdafac34ba7b82
Timestamp: 1512834788 Timestamp [UCT]: 2017-12-09 15:53:08 Age [y:d:h:m:s]: 08:153:03:35:27
Block: 60225 Fee: 0.000001 Tx size: 0.4053 kB
Tx version: 1 No of confirmations: 3937122 RingCT/type: no
Extra: 010ab0d2bbaf9a53005a84ce7fa2bf48dd5cc779cdc8957756dbbdafac34ba7b82

2 output(s) for total of 0.00 ETNX

stealth address amount amount idx
00: 641e447a0e6f2ca42bef26eb9f45606d53adc8a2668d57ea91ef8b242f692c9a 0.00 34390 of 613163
01: 30dcc1c182fac8e630007b2b83ac8ccaafec0cf0e2ecd219b2b4d322c61fdf1a 0.00 235507 of 968489

Check which outputs belong to given Electronero address and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Electronero in this transaction

Tx private key can be obtained using get_tx_key command in electronero-wallet-cli command line tool
Note: address and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2017-12-09 12:58:52 till 2017-12-09 15:06:15; resolution: 0.000520 days)

  • |________________________________________________________________________________*_________________________________________________________________________________________|
  • |__________________________________________________________________________________________*_______________________________________________________________________________|
  • |____________________________________________________________________________________*_____________________________________________________________________________________|

3 inputs(s) for total of 0.00 etn

key image 00: 8d56ec17cd441295ed1e2bb5cd2e750795160f5b99e56721fe86650ffb1b7165 amount: 0.00
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 16d1bc568f6da48e67f7ac17916397247864283cc37bea55349be95825a27593 00060113 1 7/5 2017-12-09 13:58:52 08:153:05:29:43
key image 01: 736e9e30f5c1d474cbd4ba7985fc1d1502ac460c83c57aaaa507b7f3f2b2f9b8 amount: 0.00
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 7bea8411e8ad2a198ced62aebfbe370fe532436bc20757b7d33bb275cce6e1d1 00060123 1 6/4 2017-12-09 14:06:15 08:153:05:22:20
key image 02: fc78f92dc4e99468fd834c0714a0ba4d5ec15e18ef605cb489f96ecc3b79886b amount: 0.00
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 4ab7f4abc16eb975efe0b7deeaece2515ecf7fcc8851efb0f91addacdc981eee 00060116 1 3/3 2017-12-09 14:01:32 08:153:05:27:03
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 4, "key_offsets": [ 38224 ], "k_image": "8d56ec17cd441295ed1e2bb5cd2e750795160f5b99e56721fe86650ffb1b7165" } }, { "key": { "amount": 300, "key_offsets": [ 448459 ], "k_image": "736e9e30f5c1d474cbd4ba7985fc1d1502ac460c83c57aaaa507b7f3f2b2f9b8" } }, { "key": { "amount": 500, "key_offsets": [ 366317 ], "k_image": "fc78f92dc4e99468fd834c0714a0ba4d5ec15e18ef605cb489f96ecc3b79886b" } } ], "vout": [ { "amount": 3, "target": { "key": "641e447a0e6f2ca42bef26eb9f45606d53adc8a2668d57ea91ef8b242f692c9a" } }, { "amount": 800, "target": { "key": "30dcc1c182fac8e630007b2b83ac8ccaafec0cf0e2ecd219b2b4d322c61fdf1a" } } ], "extra": [ 1, 10, 176, 210, 187, 175, 154, 83, 0, 90, 132, 206, 127, 162, 191, 72, 221, 92, 199, 121, 205, 200, 149, 119, 86, 219, 189, 175, 172, 52, 186, 123, 130 ], "signatures": [ "40b79cc43822a46c9af6a0198eaa165a49433f127695715cc446bbf0349ac10bc25df5148396c58e40abbb1af2722138be8860f169d565f7345260fc2714f509", "cdd5e2dffce484e9212ade9caa184aedb4516154e3b394e696b4c9033231530d6e75974a263e59c25872da73012d6ed1a87de248add42ab230a8a7add8ead00a", "e1e04056087ff349ab4fd7d1d9e4b2c41933441faba607e0890aafbb01c7db0677006fc5b7d34f1d23c4131948e77040dd9c68232d17f9ddb5a7855bdad80006"] }


Less details