Tx hash: 16db042b0f771147e9f4bd7997d6529898c578d9329978c79cad630d32d18295

Tx public key: 797fe220e496558e5cc98644dab5732f565b870177623a074c31989ec75db274
Payment id (encrypted): 0457ab937c93c0ab
Timestamp: 1542349832 Timestamp [UCT]: 2018-11-16 06:30:32 Age [y:d:h:m:s]: 07:177:17:13:35
Block: 507054 Fee: 0.015000 Tx size: 2.2061 kB
Tx version: 2 No of confirmations: 3491931 RingCT/type: yes/3
Extra: 0209010457ab937c93c0ab01797fe220e496558e5cc98644dab5732f565b870177623a074c31989ec75db274

2 output(s) for total of ? ETNX

stealth address amount amount idx
00: 037db64ae3e645cae300858a5bee325b8e95d78195114ba483401685412346b6 ? 1273668 of 7008235
01: d55069b3065b15f30ad8a3384742fb4ad6dd31cdd5e7cb714f90ca42dab860c6 ? 1273669 of 7008235

Check which outputs belong to given Electronero address and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Electronero in this transaction

Tx private key can be obtained using get_tx_key command in electronero-wallet-cli command line tool
Note: address and tx private key are sent to the server, as the calculations are done on the server side



1 input(s) for total of ? ETNX

key image 00: 04686ad6a92d380e984f80d0e061eedddc8adf6ec87d5115bf1afea70e51bf43 amount: ?
ring members blk
- 00: 03252f93d6def11314d9d1ec23f664d8af793a7ed59bb112f7db25f6061fe1ad 00319883
- 01: f42add65faccbe937daf831db04001fb8d0659184d882c38ac1fbbd182985c14 00379753
- 02: 2407b431a7672378660bfc07a1cfc609a1a5fe18e62cafafeb00020425766583 00380328
- 03: d83f34445384f5de929ef7aa67c182c7f4fd8c417a3eaf6960f818b50c72ea6a 00462639
- 04: ce4f1b3ddd25585b89f47cd1d23abeec122471e377481e7c43fcdc044a4384d6 00505795
- 05: f3556a005ede4e41bcf32ccabb8e57cfd8c4baaf0d7cac816112c187ddccab6f 00505841
- 06: d0bf13bac60067f829dd5d4ecad1d7ca63221148f61de9bbd2c77fb3989400f7 00506665
- 07: 87a3c17e24a9d66a701ed3d8e3380ad2214b38a6c7e98b7bd0a877c149b97d89 00507041
More details