Tx hash: 2bdaf0b53ba4b34b078e5cc4d717850f5e547332cf69d261b1f5810ab6c243f9

Tx public key: 0fa39b6e2e808ff72c257b00dc20b0fa469feb1ce76365f1f6f6aca26fb54e7c
Payment id (encrypted): 17cb7f5e21050c26
Timestamp: 1528912293 Timestamp [UCT]: 2018-06-13 17:51:33 Age [y:d:h:m:s]: 07:330:17:54:37
Block: 317722 Fee: 0.080000 Tx size: 3.4893 kB
Tx version: 2 No of confirmations: 3677799 RingCT/type: yes/4
Extra: 02090117cb7f5e21050c26010fa39b6e2e808ff72c257b00dc20b0fa469feb1ce76365f1f6f6aca26fb54e7c

2 output(s) for total of ? ETNX

stealth address amount amount idx
00: 2fc00a97159546430b7419bf4638ef34562fc73659b9d9ae8660f799ad2e6e00 ? 53363 of 7004771
01: 523fbb65c456baf498bf21ca6b1b53af67d731114479100b861721dd7758fb7a ? 53364 of 7004771

Check which outputs belong to given Electronero address and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Electronero in this transaction

Tx private key can be obtained using get_tx_key command in electronero-wallet-cli command line tool
Note: address and tx private key are sent to the server, as the calculations are done on the server side



2 input(s) for total of ? ETNX

key image 00: 394c6ed902b276bbe31b8f1e2e67d134e4c15a20fa4aea287839262d8c97fa10 amount: ?
ring members blk
- 00: d5ac198ea25541bc5d5e4a729defd330b737e6a75c8b19eed7b7c6c9ebb3c138 00310033
- 01: 660f6e09c0f265b107353447a4d7c9a86beda95488b5b86308906e9720100074 00311892
- 02: 5c4b84c29f379fe07cf50c49fe2d9c2170aede17c353fa805a7e72fc9f602a84 00313098
- 03: c38e7cb24e806074f83d9486ff6580d7efef105a5b405eca885c665e92141a60 00313654
- 04: cb7491fd0925550b75a1875b77bbb02316704694247bd208135e6ef8a2128cd2 00314124
- 05: 50a7a8e29d0178453425d11690681b4f00a8c58d783726b44502f77bdbf7f625 00314599
- 06: a4d22125949748c7e5020ad44b18f3d2044a337c2062daa3a60e91e332888b7a 00315327
- 07: 0c843d7a2482b52073ea01fb2b25e77553c3ac333f7c17830a25d1dd28d470cc 00316660
- 08: 8bb54d9abd04de28f3aee08939df887f69cf6df98e628b983d6935a3bf5cbc6c 00316972
- 09: ca785e5d2ce70dd3640444f0e9ccbb50f55a8ca84d5cac2242f98f0854d5af45 00317057
- 10: 5a9835d45f4801d5e3c1848d45cb04b9b76c519295a5eff5b430600aa51531c1 00317481
- 11: 9634150ce25c0692a94ed98814b39e2667f6d88ea904aa6902cf02f99b5211c6 00317671
- 12: 017d537f85c84464abc19244567b17b1fab57b0622713a00b5d92bdf131037f4 00317710
key image 01: 29e810fdbd398151d3e8e23d5788ac12b296db99fffa91911618c36cd26ba177 amount: ?
ring members blk
- 00: 870ef5593293fd08758d689dbb46993d0cea9f2ccf87f94c8dd79d97be937163 00311593
- 01: 0999d0c64a302104e0d5bf9c792525569a4cd5d9b2985136dac4d24221209bca 00313654
- 02: 60492aa2afca9d0d8c9a6596669adaea3fa5a3c691aabde35f71db7733f564ce 00313708
- 03: 5ff1af6b6cc21dafaf8dfc3873282a9ad0ae9efb02c3d939531181e3be899780 00315411
- 04: 881a1b7118325b43f3e4c02cf4bfacd9ff50dd665463929dbeed86c42a2d8595 00316907
- 05: 251fe52526f355f5ec2d50a126e7bda006a904c1f724c84fa4e116d449eb856e 00317007
- 06: dea1c3d4302b4b855e663e0ff10618647782c64dfc5f96e9dfbd429ecac95d0c 00317007
- 07: 52ff695879107942820d1abcfb75f3bd46744c05e037db9f81e74af6ab89750d 00317221
- 08: ad2cc691ac42946d4a1c244112320b5115324bc007f0a0645bd0f75967066ed5 00317231
- 09: 5d3766300e57a5004e8e0d629bea830466b04c08b6ddb073df21849fb8582d67 00317512
- 10: 3f2f101787a27c3058be4d1e4025180dfcbfb7f7a0f30da2c08b155b3367f154 00317635
- 11: fc1f370bb1d9cdf74a49f00b1fb5d0fd0d721989900f84200c426a67592d306a 00317691
- 12: 069e8f6b05b7e1caad6ce3e0eae8091e79224784f2cfab4c0e4985297e71d042 00317696
More details