Tx hash: 2a57008b41251fa2c479f5fad5593b4fae874ef5551156cabcbc58cc51436696

Tx public key: 6f698086a33bc03c38326f9d7c124fa5989e82342f240e33af4eb868255da782
Payment id (encrypted): c344a9338dd7b736
Timestamp: 1535087674 Timestamp [UCT]: 2018-08-24 05:14:34 Age [y:d:h:m:s]: 07:253:18:39:03
Block: 397938 Fee: 0.015000 Tx size: 2.2051 kB
Tx version: 2 No of confirmations: 3589913 RingCT/type: yes/3
Extra: 020901c344a9338dd7b736016f698086a33bc03c38326f9d7c124fa5989e82342f240e33af4eb868255da782

2 output(s) for total of ? ETNX

stealth address amount amount idx
00: 79164c2b521723b20dca1fa31c36312ec41cb5d2dc60e1b11084273e39eae2a9 ? 522088 of 6997101
01: 23b2f1400dd6811029b40b25936b9ca05ab443f5eebb26e30013d7dfb59e0873 ? 522089 of 6997101

Check which outputs belong to given Electronero address and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Electronero in this transaction

Tx private key can be obtained using get_tx_key command in electronero-wallet-cli command line tool
Note: address and tx private key are sent to the server, as the calculations are done on the server side



1 input(s) for total of ? ETNX

key image 00: 3e90e5d09612ed9df1d5d39b5ee926e87f825801d44a58857280719c413f92bd amount: ?
ring members blk
- 00: d969de3834f978008134110b8783695dbbefdd6ddecd2953b0cdf0471217e0fa 00326385
- 01: 0db2cbb42046cd66bc36e7ddae41448ac5fa911d2d074b7c3ed553af1e6e683e 00374413
- 02: 4a1d2409176fede80a50d431b9ced3fc386d80e12ef8bfe77171b2fe064e2f13 00395791
- 03: 91323c020be0dad0069381ddd2ab1adb59a1d840e925439107163eb66cdcd2b4 00396859
- 04: 33fa059004ef757a1926150a491ca354a8969905fad26ee053c8a25d42c9c738 00396914
- 05: 6b3f544e2c2b1ae8675c9f0b99fcc5ee8aed454bd96e90acc4a17714d6b83878 00397029
- 06: 030b9e32fd4cc65c321d0114c73b40100e256fd06a8720fa4abccdc6b1c9db9d 00397714
- 07: 8092ea30ee1a3e681e209603a1c421809e18e47c29ed4b556df0e5cf914df064 00397919
More details