Tx hash: f6175715d6eb5f90d2674464edcbeee02bfc0566160fa246d8d373f024d72951

Tx prefix hash: 009553f7e066db0044326087c5114716bb17e775f4787d5733b1c98732d7aa25
Tx public key: f07e9dfba65ad3b2bda019f6c6bd3dc1c06099915d7f98b174ad89e50bcf4b1f
Timestamp: 1512844100 Timestamp [UCT]: 2017-12-09 18:28:20 Age [y:d:h:m:s]: 08:146:05:52:02
Block: 60349 Fee: 0.000001 Tx size: 0.4053 kB
Tx version: 1 No of confirmations: 3927523 RingCT/type: no
Extra: 01f07e9dfba65ad3b2bda019f6c6bd3dc1c06099915d7f98b174ad89e50bcf4b1f

2 output(s) for total of 0.00 ETNX

stealth address amount amount idx
00: 5731309e96bec3ee9dd293500629091db8dcfe2f3f45d7588a2cea3a5d1d7879 0.00 368739 of 1331469
01: 2ae85e6285e1b3baf6245238a107118ef31736a8f7f424445e0ea775ff2790bd 0.00 110279 of 918752

Check which outputs belong to given Electronero address and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Electronero in this transaction

Tx private key can be obtained using get_tx_key command in electronero-wallet-cli command line tool
Note: address and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2017-12-09 16:20:15 till 2017-12-09 18:48:39; resolution: 0.000606 days)

  • |_______________________________________________________________________________________*__________________________________________________________________________________|
  • |_____________________________________________________________________*____________________________________________________________________________________________________|
  • |_____________________________________________________________________________________________________*____________________________________________________________________|

3 inputs(s) for total of 0.00 etn

key image 00: 4075bffde71be231f538cb18bd43aa115f1375e449c8dafa55ebd18d437d07d2 amount: 0.00
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 3e757f8bcbd547cb4f2143631ccd589fc6b0ac0a7646c554586b998c3d94937d 00060289 1 2/6 2017-12-09 17:36:17 08:146:06:44:05
key image 01: 9bd0c91a414e1d019682947ac5ccd31ca8d722ea9f2a4f3c52e7a54c0ee5ab8c amount: 0.00
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 34d2039d410589086934458ab2f329f56d6a5a9a0448818960f2cbe31c972d48 00060277 1 2/2 2017-12-09 17:20:15 08:146:07:00:07
key image 02: a77b2ca519f8bb438f333ff091b514c0f02b4cee55d8539e20721824b492a89b amount: 0.00
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 5fca90e3ab214c0166e66ce81de3dc429ae977a7b50a816f2a868dea5d941ffb 00060302 1 8/4 2017-12-09 17:48:39 08:146:06:31:43
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 200, "key_offsets": [ 717085 ], "k_image": "4075bffde71be231f538cb18bd43aa115f1375e449c8dafa55ebd18d437d07d2" } }, { "key": { "amount": 8, "key_offsets": [ 103634 ], "k_image": "9bd0c91a414e1d019682947ac5ccd31ca8d722ea9f2a4f3c52e7a54c0ee5ab8c" } }, { "key": { "amount": 300, "key_offsets": [ 450487 ], "k_image": "a77b2ca519f8bb438f333ff091b514c0f02b4cee55d8539e20721824b492a89b" } } ], "vout": [ { "amount": 500, "target": { "key": "5731309e96bec3ee9dd293500629091db8dcfe2f3f45d7588a2cea3a5d1d7879" } }, { "amount": 7, "target": { "key": "2ae85e6285e1b3baf6245238a107118ef31736a8f7f424445e0ea775ff2790bd" } } ], "extra": [ 1, 240, 126, 157, 251, 166, 90, 211, 178, 189, 160, 25, 246, 198, 189, 61, 193, 192, 96, 153, 145, 93, 127, 152, 177, 116, 173, 137, 229, 11, 207, 75, 31 ], "signatures": [ "6f27cbf23eab1ece218f8a6bf24ec6b90788d2f23331f11f9da4421cd2145e0e55d20bd86a9f0e894025de39fde8fec1f87eb036dba5a62fe805106f6c05730c", "7e3268150f0bde4a3fe431617514c84e7d4427e95b7af4689d66c6b3aff44c02f72675f443e18d5f2d09561569185a19cc859af137c373abd8744fd13438eb07", "11f9437dfc2ff44a92b900c8a91e04e86e326a3e28a985d1e22a15683ea9e80837bab035f89e24203d290088a03a7c577d52b62c6e652aeb451eb948a3154000"] }


Less details