Tx hash: 2a48b3f14f14642cc13d1cde23c921749c4d358d4b5db235b73431e089775bd5

Tx public key: e734b22f5204cf2b42e1ae117c88207117d4c93000b7c2b2c00d661b06edb5c9
Timestamp: 1542837027 Timestamp [UCT]: 2018-11-21 21:50:27 Age [y:d:h:m:s]: 07:172:20:26:58
Block: 514868 Fee: 0.015000 Tx size: 2.1943 kB
Tx version: 2 No of confirmations: 3485193 RingCT/type: yes/3
Extra: 01e734b22f5204cf2b42e1ae117c88207117d4c93000b7c2b2c00d661b06edb5c9

2 output(s) for total of ? ETNX

stealth address amount amount idx
00: 1c4aa4d1608a9f68068e7c298f6998acc653b836283d4f04665f37ca94661f08 ? 1327517 of 7009311
01: d9b63ac31c125a8b5a20369f05e75216af5a8cffdc7ea3ac48af64c9080cbd79 ? 1327518 of 7009311

Check which outputs belong to given Electronero address and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Electronero in this transaction

Tx private key can be obtained using get_tx_key command in electronero-wallet-cli command line tool
Note: address and tx private key are sent to the server, as the calculations are done on the server side



1 input(s) for total of ? ETNX

key image 00: d0a94d4ecb8e5417fe1e4dfac5c07a62d7d61cdac5a0f9a2d228d23bdde2b33e amount: ?
ring members blk
- 00: 70833170309c2147777e7fa809e04b6629d15c20e18ce69bb405b6bfe2c48d4d 00399066
- 01: 3ce61a7f32ceae67d8622b93637f585c1410166b50044ea39a9fb88a21d659b2 00484196
- 02: 268b9f5eb123c295942010c0155eb6781eb3441ecda5d013864f8caed87cc764 00513447
- 03: ffb1f04ecd2f0fb4acc4a379241e2b14f3962e30eedf6c078bb8e573b929e549 00513634
- 04: b6f39ec9c2b6ac4b70d32cea17fdb1dcb684704b98af7321f339273aa22f05c5 00513658
- 05: 7a4305ae0ad558119d4b34710015eaa12784db3759fe8f407daa907e122d9107 00514176
- 06: cc82733608ba0755c97d1fde2aa1be3a8cb9035cf5effc3ba08940aaa1fe58d3 00514764
- 07: e04666eaadd712fde34f146a133b128afd2b9e0956348a0f549030b13bf917df 00514853
More details