Tx hash: 1f4340fc58937b1d9330087964635e5a7404f3660a609faa622a87ae7d453164

Tx public key: d9b95bf514e645bf42a0bc3679b63c753117469b4f7938c0dc2082b88518468a
Payment id (encrypted): acd4035fd13489a9
Timestamp: 1543126512 Timestamp [UCT]: 2018-11-25 06:15:12 Age [y:d:h:m:s]: 07:169:16:18:02
Block: 519489 Fee: 0.015000 Tx size: 2.2041 kB
Tx version: 2 No of confirmations: 3480818 RingCT/type: yes/3
Extra: 020901acd4035fd13489a901d9b95bf514e645bf42a0bc3679b63c753117469b4f7938c0dc2082b88518468a

2 output(s) for total of ? ETNX

stealth address amount amount idx
00: 1cc9cc161c4bd8bb723ea8b1b4629e14b99332cad998f9c319698b637ae76fe9 ? 1375643 of 7009557
01: f406532f2c370e076295008357388548f2e92c71a142503db460ae5256b17263 ? 1375644 of 7009557

Check which outputs belong to given Electronero address and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Electronero in this transaction

Tx private key can be obtained using get_tx_key command in electronero-wallet-cli command line tool
Note: address and tx private key are sent to the server, as the calculations are done on the server side



1 input(s) for total of ? ETNX

key image 00: dcb15182e8e3434a72c83c8a86b1e518baeaf57967a91ff22ae514ee45816f56 amount: ?
ring members blk
- 00: a28033a16feb2cfe36b0e9206ab2140b1a9422e9e113469322856cf24675f1a8 00451210
- 01: 3c2803e299b6d30ae43052950c4bfcb8234f1940c817deec0a9516c79cdf0a72 00505422
- 02: ab061a33a20ee60a1fc8cf356183792ea82daf297045a0363bbfb2fffd034d05 00518138
- 03: 05c0b7841be6f23cef890e861b51819a43cc559deea62e59397c45644d950f89 00518751
- 04: fbeeb95ae100ce1002026645c1d8730c08ac6e6cf846f25852bb6f27c60d50d2 00518877
- 05: f79f660df67e659451902b300e836b96cbbcdfbc6f94bd513e9e07593047a825 00519083
- 06: 891d2267ba9ef2893cdc733ec71a50e3a71456aafd03ab27e3b70a75263c0e7d 00519456
- 07: d05a282f10657eb017053c15437617d81bbdb32dc3890bc956732536187745ca 00519469
More details