Tx hash: 429dfa31782473868078c83f0e4be282f905912b007ad74e3211e590793b006e

Tx public key: 779b4ed4305e12f14633b444bcf160238f3010b3cb70b8ad803fc78f28bc08d3
Payment id (encrypted): 5f0ded050bb3bf21
Timestamp: 1542975284 Timestamp [UCT]: 2018-11-23 12:14:44 Age [y:d:h:m:s]: 07:170:20:52:12
Block: 517061 Fee: 0.015000 Tx size: 2.2070 kB
Tx version: 2 No of confirmations: 3482471 RingCT/type: yes/3
Extra: 0209015f0ded050bb3bf2101779b4ed4305e12f14633b444bcf160238f3010b3cb70b8ad803fc78f28bc08d3

2 output(s) for total of ? ETNX

stealth address amount amount idx
00: e82c387c747bf9b21198d8c5adfa9cf755c7e992d82cf0946311f2d61598e031 ? 1349251 of 7008782
01: d59a574db1f678784b1fdaef8b2b669ec045421ee5ad86fc748de57212d9469c ? 1349252 of 7008782

Check which outputs belong to given Electronero address and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Electronero in this transaction

Tx private key can be obtained using get_tx_key command in electronero-wallet-cli command line tool
Note: address and tx private key are sent to the server, as the calculations are done on the server side



1 input(s) for total of ? ETNX

key image 00: f59be5d9dc5e6a9b1c701435a449286a36362449beb16db3f6e89400116c1f66 amount: ?
ring members blk
- 00: 4121cbf029327fe53273973fecfee24a8d73276661e3edc816e3bd2c10e9dd4c 00450371
- 01: 75765419ef08bb561acb081f7227ff474299b8833fe427db90ddf9c4c27a0581 00469408
- 02: 067deede67d11ad54e9c90970ec558b9b425a43e22e4737d8e55d2c4860a0994 00503894
- 03: a6022056595fc01acb4b4930fcade9b77451abbca0b3387e7acac2bc7b3630ed 00513006
- 04: 2e07e9eb349cebb98d0a4b9edb0398db1217e9a0a50b08516822f8095d56f13f 00516069
- 05: d8a766a8cb9a0ad8910803d628a19ac9c025198b3d2caba05f51a8abfa991b49 00516589
- 06: 5c2beace96f09f9cb022958b78df4a459f469781f72ae5f5c27ebfe2c7587cca 00516752
- 07: 31a473239d5eb394f64c47f113260d454677d9501e8a2d8eda13e15a582e2c30 00517043
More details