Tx hash: 51be25c6f0f068b0718261343ee9464e407046cefc1ebd2c133b18a0fc421940

Tx public key: 34d2b490617acf71f3ce26ce6614c5deb5e373ad0ecc50671780af90ce41a338
Payment id (encrypted): a39b070dcdd0afa2
Timestamp: 1543114520 Timestamp [UCT]: 2018-11-25 02:55:20 Age [y:d:h:m:s]: 07:169:18:23:08
Block: 519291 Fee: 0.015000 Tx size: 2.2051 kB
Tx version: 2 No of confirmations: 3480949 RingCT/type: yes/3
Extra: 020901a39b070dcdd0afa20134d2b490617acf71f3ce26ce6614c5deb5e373ad0ecc50671780af90ce41a338

2 output(s) for total of ? ETNX

stealth address amount amount idx
00: 0ebb219292a4cfceefae1d687ebd40bd2b5a181db1c898eb188ff737df4cfda4 ? 1373631 of 7009490
01: 4598ab58c9eb531b007a4a28976d1632e16f959f3949e4cce97061f4f2122e0c ? 1373632 of 7009490

Check which outputs belong to given Electronero address and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Electronero in this transaction

Tx private key can be obtained using get_tx_key command in electronero-wallet-cli command line tool
Note: address and tx private key are sent to the server, as the calculations are done on the server side



1 input(s) for total of ? ETNX

key image 00: f0d2dccc4d71cf58fdfa2172cf383891090ef03887b33d409a61d6a097e9c006 amount: ?
ring members blk
- 00: d5125effa6e5c3199e86600553b073848ffcf750f0ee58a027b9b78a677c09b8 00405859
- 01: 6d59b7a43247922b5badee928133870c22789f67a68989d66aa0a9ba9c3e0594 00407965
- 02: 3cf6380fbb469b84f32eaa5e77cddc949522ed03d30d8e62a7bfa0025f441196 00457858
- 03: 374bc4fef12ab31e108e73869bed555112e4d72f76a684f512b34ccc71ea23bd 00518434
- 04: 390daefc6280ec8f0df5a3ad173be8e715d5f419adee5a37547ca27b53bfef09 00519060
- 05: 650684d7cccc3b2045985aeaca5c17bfcc77031ad3c4ba2ba71c4891f088050e 00519173
- 06: b01aea9bbd28953e0195bb33aff9c317e8f242e21f3d51864b2abed5c6aa44b2 00519230
- 07: 0df964b4e5905b5c344d385534a2d3347403bc6566e505e7d8ce8295e324689b 00519263
More details