Tx hash: 51f8d2eac0b89b0f3272ce95f212577e6864ee9dde76077d369307d27bc62bd3

Tx public key: bc38940a01fbf18d94c945888a455c011379e06e54b54f933c8406f742c89d00
Payment id (encrypted): 14dd111f41cd61f9
Timestamp: 1543931562 Timestamp [UCT]: 2018-12-04 13:52:42 Age [y:d:h:m:s]: 07:153:12:01:48
Block: 532394 Fee: 0.015000 Tx size: 2.2080 kB
Tx version: 2 No of confirmations: 3458356 RingCT/type: yes/3
Extra: 02090114dd111f41cd61f901bc38940a01fbf18d94c945888a455c011379e06e54b54f933c8406f742c89d00

2 output(s) for total of ? ETNX

stealth address amount amount idx
00: c8ab4afc0d1584374f1671f8898ac039f100cb1d58621e048fa78fcc73078b45 ? 1515022 of 7000000
01: 2a27b0447dace4b6b53811f606893e23a58b08033b28dbf0fe4a5bad9266e28c ? 1515023 of 7000000

Check which outputs belong to given Electronero address and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Electronero in this transaction

Tx private key can be obtained using get_tx_key command in electronero-wallet-cli command line tool
Note: address and tx private key are sent to the server, as the calculations are done on the server side



1 input(s) for total of ? ETNX

key image 00: 2bf8700556cc74a343d4c032f24de399c0c695b7a9efd3f25f47fb2c4b5ff0b7 amount: ?
ring members blk
- 00: bee21cc1420e5c4e783e8d794407b09ab77d8c87df0c419d4ade9911a5e117ec 00399713
- 01: 8230b84541f9de5f7017c6fab5bfc1f78c95209d8a31d593cbc05d3bc40da1a7 00428919
- 02: eae26a6dea1d185f2df2b35ba850b466bee0c0e29efe1adf2b627f34fa2b03f3 00477352
- 03: 61d783758b61008c71e11ec354337209ff3d985a39fe3e973d8f1a5ef7cb75f8 00491888
- 04: 93741ccafeb9e37fcd5e93a0b28f4cc08d868195f33e50f09152ce888ffb8d7b 00523242
- 05: 8ae32265ad1413d61cae79a878d70b90998563d0f5581910399d89abf61d45c3 00531537
- 06: bc24d423e1fe9f402924a0967842687a4ca81cb46e03351cdf6b551ab04af06f 00532344
- 07: db33f6c0a0383f09b71eb4cd312391f498af9a9798e4ff76cee30f77f0defed5 00532379
More details