Tx hash: 54d613ccd8bd1ffdb0b4e193d4b4f1a7f6b2e9e43f805b623abe5997577d8d77

Tx public key: a5434d6c7f0b5de7196e3af4492d528fbb9b3c23be692eaebd0c4812ad309207
Timestamp: 1536077456 Timestamp [UCT]: 2018-09-04 16:10:56 Age [y:d:h:m:s]: 07:247:12:17:26
Block: 413804 Fee: 0.015000 Tx size: 2.1963 kB
Tx version: 2 No of confirmations: 3581292 RingCT/type: yes/3
Extra: 01a5434d6c7f0b5de7196e3af4492d528fbb9b3c23be692eaebd0c4812ad309207

2 output(s) for total of ? ETNX

stealth address amount amount idx
00: 256ff674dff472e59ec4643f01800a74b0f57eed50bd22f91a07a754f1a16efb ? 638840 of 7004346
01: 47071caf7a3edb2a62665fab9fb2bad671160ca39da17391dfad68bc42ece356 ? 638841 of 7004346

Check which outputs belong to given Electronero address and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Electronero in this transaction

Tx private key can be obtained using get_tx_key command in electronero-wallet-cli command line tool
Note: address and tx private key are sent to the server, as the calculations are done on the server side



1 input(s) for total of ? ETNX

key image 00: ce1d8c9d870ac145ee6ef0e8e35d31f574d768c3d75b20b4005a176d7085582d amount: ?
ring members blk
- 00: 240c9613419de9fa96360f22f683e4c1e92ea988e94ac89f3284f636ea5aa6af 00313213
- 01: f6877b65b8b5b90cc0b9bc91b3249f042933f0a34f93300def58e45d3dc38b54 00338606
- 02: c7399cb6db7662a82733ae039752e2dfff1a50202513fb44753ba589f338bee5 00340489
- 03: 9890b193d71266e647894d3d32b5997d2054f46b7e7488cd595eb94aab2ede6c 00384779
- 04: a74423d0080094014ac688dd97dc3ae8ccca48bf5ad3dedad211418129c351e7 00405538
- 05: 088150849dd6a3a581ff6473a1e637b8f189b120d4e4f138b0ba25f0c9d9500c 00411967
- 06: 879e2705c63548f467f3dd85b8cdf591ae4e45f7ebf54a13d31e75ef927fa9db 00412800
- 07: 2e92ef706e6523edd190c46b473796ff250dcf69130acf9a6ec9b9215e15b58a 00413787
More details