Tx hash: 0359240b90f777c330a4b98993512c3edf47c000651d7848e87c29ca61fcc62c

Tx public key: 02a5347b33a4d3bc06b65c9d7896f3fdda37e09ec9585889501e426c650e6906
Payment id (encrypted): aa13d2381cc44bf2
Timestamp: 1536619027 Timestamp [UCT]: 2018-09-10 22:37:07 Age [y:d:h:m:s]: 07:241:07:47:35
Block: 422499 Fee: 0.015000 Tx size: 2.2061 kB
Tx version: 2 No of confirmations: 3572717 RingCT/type: yes/3
Extra: 020901aa13d2381cc44bf20102a5347b33a4d3bc06b65c9d7896f3fdda37e09ec9585889501e426c650e6906

2 output(s) for total of ? ETNX

stealth address amount amount idx
00: 85cc07b45b5be18a8d04a2b30b48964e9e5e727de3776beca1688b99e6521782 ? 696479 of 7004466
01: 9142d1a3ccfdb297dffa5b36f94c25a5ca0bbda72ba7a9f0782e6f89c1745986 ? 696480 of 7004466

Check which outputs belong to given Electronero address and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Electronero in this transaction

Tx private key can be obtained using get_tx_key command in electronero-wallet-cli command line tool
Note: address and tx private key are sent to the server, as the calculations are done on the server side



1 input(s) for total of ? ETNX

key image 00: 07ff006761ad8ad35d8f6251691bd4413e7c666e8925f382686d207cf52feaa3 amount: ?
ring members blk
- 00: d0cbec71bd3b7cd566bb69f5993ce4239c417d491aa6caa460cacd4420f1b8c3 00362803
- 01: 4d8ed1dac402068585fcafec3ae1457d54fc41deb341638b7bc157e43d8a091c 00407442
- 02: 81cc10cf05ddc642b1d132034c63b42d288b39c6338abf1977951abbbcadbce5 00413395
- 03: 9336327004cb4f6373d4a5c71ff6fab5aa6c9f491f175b913f5229bb0b9e6892 00420675
- 04: ed7748107eb3d695ceb7e72a50f000b0714561ff4b64425d0442b3c487731011 00421272
- 05: 7f12e4b292687cc68ff87214deed7f029c4e8a407a6f8018656a8564de6c5188 00421440
- 06: 574f1f84d832e2f9e4673aad90bc7ad97c93f53833cd8d2d3c11e18360dfa8d3 00421900
- 07: bf561e1e83bc42b3bac0a1183eec4d1ee729dc7945aa558099756149e6e563c2 00422478
More details