Tx hash: 1319130203d6dd5d474cdd98659dbf42b278b1ff6a7988f320e296c20a8cbf83

Tx public key: 0861635347b98c73344f9d3b7f251f8c3fcbd2c9d4e5b220a06618657d211445
Payment id (encrypted): fe31edabedf0f697
Timestamp: 1543073469 Timestamp [UCT]: 2018-11-24 15:31:09 Age [y:d:h:m:s]: 07:170:09:01:25
Block: 518633 Fee: 0.015000 Tx size: 2.2070 kB
Tx version: 2 No of confirmations: 3481794 RingCT/type: yes/3
Extra: 020901fe31edabedf0f697010861635347b98c73344f9d3b7f251f8c3fcbd2c9d4e5b220a06618657d211445

2 output(s) for total of ? ETNX

stealth address amount amount idx
00: 8ed54f57c5e7338575e258427a069749aebec38bb7ed359efa7c11a42dccbf16 ? 1366726 of 7009677
01: 411bdaf66008af1fb662e7f7717d5476bcced8d3d47f2706191c868a432a916f ? 1366727 of 7009677

Check which outputs belong to given Electronero address and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Electronero in this transaction

Tx private key can be obtained using get_tx_key command in electronero-wallet-cli command line tool
Note: address and tx private key are sent to the server, as the calculations are done on the server side



1 input(s) for total of ? ETNX

key image 00: 665095174a9c94fafb0fe0d1a82bd58fd5e18183c059dc11fe5a528f6ec0b34f amount: ?
ring members blk
- 00: 4209a714f4ce3d31a752f4db6d30952a86303c1c5bce85332e20b6ea23cc82b6 00371130
- 01: b23efa0c20d7d8cc3c2fc6ee4d05a3feba08a2c0f6b751eb6aa0e4b4a70f11b8 00423522
- 02: abd9091ec158e98c1e472ffa2cf740e0cdbe92d5c57f0429ebaab14da821d314 00429907
- 03: 0c21c4c24176448d20dc181c68304d3d07418b0171e7189a208851d0a2e6eab6 00457335
- 04: 6cea8d128f354baa431a7401648855d68aa05c56dca749b7e487cc7a8a63c18f 00518056
- 05: 9578e7945d34ff79e45582473fa8408f2faa5e8f8b85f4a949f1a9d79d959502 00518269
- 06: 3dbd80c7ed4f03f31f43ef93788070bf6eb18f6f7681bbf765fcfc028675fcee 00518536
- 07: 84a6ce7e150fada62973478afa6eef126dc16104bdddee9976a0422c37e7a6e6 00518616
More details