Tx hash: 21fb839211546299c158655b5df6467053ce185e4b1103443769a06c759116d4

Tx public key: 135ccef353b150a798a3d1d4dbfbd80869452ce5bb099183bfa58f5416c3122e
Payment id (encrypted): 80884c1c441961b3
Timestamp: 1542734447 Timestamp [UCT]: 2018-11-20 17:20:47 Age [y:d:h:m:s]: 07:173:22:50:14
Block: 513212 Fee: 0.015000 Tx size: 2.2070 kB
Tx version: 2 No of confirmations: 3486723 RingCT/type: yes/3
Extra: 02090180884c1c441961b301135ccef353b150a798a3d1d4dbfbd80869452ce5bb099183bfa58f5416c3122e

2 output(s) for total of ? ETNX

stealth address amount amount idx
00: 29ab8ec9d662277ac829acda90e291325451034cd29553335cc802f43adc42fa ? 1311738 of 7009185
01: 449142674260c035cf9be1353e03fe5beafb512a9aa7beae5e17d371ba215025 ? 1311739 of 7009185

Check which outputs belong to given Electronero address and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Electronero in this transaction

Tx private key can be obtained using get_tx_key command in electronero-wallet-cli command line tool
Note: address and tx private key are sent to the server, as the calculations are done on the server side



1 input(s) for total of ? ETNX

key image 00: f7a9bbeefeef774a0a0571fbbd7390a38d0dbf7823e4e116e02225735faf2511 amount: ?
ring members blk
- 00: 280a3fba8de66ed6ad41f74f17f51ea1d1577deb7306683dfa3cd784c3b1b40c 00351427
- 01: a474a7e82b5fc76217014e98a6609be41dd0ebddaf4ab273e6d7b6d664ba211e 00391266
- 02: b878a250779f7145b509881e9260848056796b584d4eaab6e43d7960c43e201e 00447208
- 03: 5e2750bedd41ca3ce3ca5fc4b8665ecc09641b4967b9e4cfefc64780eb613a4b 00481598
- 04: fc1524f27d8338825140f4ca22536e4d2e5de1507826506c5423ec10a6706e7e 00482719
- 05: 139aa898dbbf02ff0aac22e3f69d6a72e9068f3c8689cac987062d88e8a3b9cb 00511147
- 06: e8d2ee49e93eaa7fae4f0f7f129641423cc4d41f7ae77f4a45f98fd60cb6d3ae 00511393
- 07: 540b98ceb61c843deab1330ac4f190a884926c4285d04a96f43b8d3ee5a557df 00513190
More details