Tx hash: 0aa204ca3885c7905b3551bdc01b91cc330bf12301f847a5ac1031bfd1fc73e0

Tx public key: b75da863204143d7617de5e405038c1eaa84437e1424a9fab7db5ba55e338c80
Payment id (encrypted): 3fa3c058ad31cf47
Timestamp: 1535078464 Timestamp [UCT]: 2018-08-24 02:41:04 Age [y:d:h:m:s]: 07:254:08:56:45
Block: 397792 Fee: 0.015000 Tx size: 2.2041 kB
Tx version: 2 No of confirmations: 3590737 RingCT/type: yes/3
Extra: 0209013fa3c058ad31cf4701b75da863204143d7617de5e405038c1eaa84437e1424a9fab7db5ba55e338c80

2 output(s) for total of ? ETNX

stealth address amount amount idx
00: ba24215f72bdefc518dbd058424b7ba2323a48acb10bfa2fbb6438ac4f3c1032 ? 520882 of 6997779
01: bc137001f8f690e4a6426c05d5200522e5c864718ddcb3e755aae50ac1059a16 ? 520883 of 6997779

Check which outputs belong to given Electronero address and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Electronero in this transaction

Tx private key can be obtained using get_tx_key command in electronero-wallet-cli command line tool
Note: address and tx private key are sent to the server, as the calculations are done on the server side



1 input(s) for total of ? ETNX

key image 00: bd5a7bfb5e9ed2168f16b532e37144671e849f1bf5f3bbfabac4d7bca6920a1a amount: ?
ring members blk
- 00: f6b14f19e3b8db0e355c3ffd82c9441c8d53640128116387c19e1776e3ce32b9 00391622
- 01: 8fbd56834ab826361ddc65fa93254020fefe03c9bfe2be5ac965f3f85b877a41 00392110
- 02: 5c7c0aa800ae6ac18cff3d857a818e07d624f4113a54f6de23a9028755de26f2 00394747
- 03: 5402b5f838a2083b08851b49ba69997c8e81e9be2aedfcdbc68fd2d8ee29731d 00396986
- 04: 3eec38d13e437db11348253285ef679b21b7d037ffb6f4ae397aef25e8d9de39 00396998
- 05: 43906d38b765cc3e3ab96009e31d2d18fd4f69d9177c7250a1b7277d56941178 00397174
- 06: f5c3d2c6af33f35ae1dfd2cd0ec522cc452044ae9278c5fad19112c1a0000b9a 00397541
- 07: 6398d770fd2eafc99fd3bc3858e386650a09fc8f9eecdace86c47cdbec441456 00397774
More details