Tx hash: 12c08d919f6d2772f18de78dd35967b37317a6652e4008b2ce225857a36cbcd5

Tx public key: 41a8a798dbcf557d38e62358be18ef8586709784716855cf1456a98fdedd998a
Payment id (encrypted): f3b07005deebc403
Timestamp: 1535208813 Timestamp [UCT]: 2018-08-25 14:53:33 Age [y:d:h:m:s]: 07:257:10:17:00
Block: 399869 Fee: 0.015000 Tx size: 2.2070 kB
Tx version: 2 No of confirmations: 3595032 RingCT/type: yes/3
Extra: 020901f3b07005deebc4030141a8a798dbcf557d38e62358be18ef8586709784716855cf1456a98fdedd998a

2 output(s) for total of ? ETNX

stealth address amount amount idx
00: fd2e0fa514b9a761d91829a789b2ab1f8415b3a468d05b8f0325d94fe84135d5 ? 539152 of 7004151
01: ff6f8cc82156371745a4a23d0dac87d0b5bc5c2931ff1ef83b5eb5e1985738e2 ? 539153 of 7004151

Check which outputs belong to given Electronero address and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Electronero in this transaction

Tx private key can be obtained using get_tx_key command in electronero-wallet-cli command line tool
Note: address and tx private key are sent to the server, as the calculations are done on the server side



1 input(s) for total of ? ETNX

key image 00: 586edbbd2083c54ac75a72745ed3712ac570840f2e870b36c867ce6a1abf5a6f amount: ?
ring members blk
- 00: 10388e874b45b18629f3871a922c088f228f2f0d28e65e05ea7886656e0aefc1 00352841
- 01: 17599d2ab88dde45c7555ff3410988dc04473c0bc53c2a6797c8d672a7874f21 00364921
- 02: ab02fbfc5680aebba66f64c2cc0d8367324020ea26e94a6506dd4e9b2107cee5 00377638
- 03: 809d8f19dd42d93e99a0d5fcf6b9817ce83923283aa595ca1c9988a7b484e782 00390683
- 04: bc2e8a077bc34780250b37795215658d60bc6d4af460f0e7b3b1aaf5c00e05ba 00398400
- 05: 22648a5474fab2e348a2771a30abcf15fe0d59d5bf234c400b7e178a3f65cdab 00398841
- 06: f5fc7744cbcebcfef7f0737cea8f3a3bf380d9e47e3e98adb62d51e7aa45e405 00399787
- 07: 24076e02353aedc3ad35c7d3b242498cd4648e224c880c1f0d473beba235bbd0 00399851
More details