Tx hash: 08c9d774734121f7b4edaa8cbbf1880f128b1159f8b7c608b0263ebb5b3137ba

Tx public key: bd842e79a8f8d687e40491affc5e1a73e55ee05210e3e1d0ec6bcf7f5950bf67
Payment id (encrypted): ab28438835478ac0
Timestamp: 1536347175 Timestamp [UCT]: 2018-09-07 19:06:15 Age [y:d:h:m:s]: 07:244:22:07:35
Block: 418140 Fee: 0.015000 Tx size: 2.2070 kB
Tx version: 2 No of confirmations: 3577695 RingCT/type: yes/3
Extra: 020901ab28438835478ac001bd842e79a8f8d687e40491affc5e1a73e55ee05210e3e1d0ec6bcf7f5950bf67

2 output(s) for total of ? ETNX

stealth address amount amount idx
00: 89006c48c015366abf941d42470e3084c5fe53a60c15fa65f817fdbaa27971fc ? 668235 of 7005085
01: 90bfbbd0e430f3883942a3b794662378278c7c0003142ab10828566591fcb9f2 ? 668236 of 7005085

Check which outputs belong to given Electronero address and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Electronero in this transaction

Tx private key can be obtained using get_tx_key command in electronero-wallet-cli command line tool
Note: address and tx private key are sent to the server, as the calculations are done on the server side



1 input(s) for total of ? ETNX

key image 00: 70c2a6020b277128ac2f5955db21499df96de15ad53770132235e4e72d7daa63 amount: ?
ring members blk
- 00: 29217fb1109b4a7b80320609fdc3dec040886a97e54068da8701ea26a1e10a0f 00381605
- 01: 5a9e90e4cff060ae7039d2e544c003b7940c893630a4cd4d6ae56540921e2be5 00395674
- 02: 5add52799e7120665ca33ecc2871c4c1a77191405fb2ed423508ad51e959336b 00409332
- 03: 3ddc2102bf1c586c564b9ce290fc94ede3d018b377b6b0b05cd580be95e2c1d9 00414044
- 04: 0d6c3a731e9a63c14df65db599ebea123af8d886e96826f031c04421f431f8ad 00416869
- 05: 42778f023450ca4a3dfd3d10d407068e281eeb8ccd9203790ead26ad872f165b 00417249
- 06: dd096b1d528122df17ad11c7dd037cba7972c70cbdbb34d93d02d4e956080898 00417615
- 07: 8d78563682f0f66ce00ea6854bc06b8a6d2cf9ae714ddcd4fa1da669d85da1f4 00418127
More details