Tx hash: 5f397cc9d6240e1d9565a306f4391497547470031c8a06bba084d1d214453342

Tx public key: 36b938201dd579ac45a58bfd532c6f5f5c1858f364f5aa74e9055ad2c3895d1e
Payment id (encrypted): 246559840969342e
Timestamp: 1537357304 Timestamp [UCT]: 2018-09-19 11:41:44 Age [y:d:h:m:s]: 07:233:15:55:05
Block: 434351 Fee: 0.015000 Tx size: 2.2041 kB
Tx version: 2 No of confirmations: 3562082 RingCT/type: yes/3
Extra: 020901246559840969342e0136b938201dd579ac45a58bfd532c6f5f5c1858f364f5aa74e9055ad2c3895d1e

2 output(s) for total of ? ETNX

stealth address amount amount idx
00: bbdde3d4b887ad801d4572712949690ebc813f9467e8f506350c3322af49b8f4 ? 783461 of 7005683
01: 4b27edf0815474524d16e31e16f03cc6e7cadc9223653e34c365ec2dbd60072b ? 783462 of 7005683

Check which outputs belong to given Electronero address and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Electronero in this transaction

Tx private key can be obtained using get_tx_key command in electronero-wallet-cli command line tool
Note: address and tx private key are sent to the server, as the calculations are done on the server side



1 input(s) for total of ? ETNX

key image 00: 99d541a73e88d19c9c677a09c7d2a359efd4706db9875f96c0f83211dfad5dac amount: ?
ring members blk
- 00: 2ded70e483511fcdefb2867caca4ea752f57bebc27e4d05b79e1012880119a2e 00391150
- 01: 5649a278c37e68fc5ba80a32097decc1b1e168aecb920f385d81dbd0a54b8cf7 00422071
- 02: 302853cc48f7e90bd63d30f010baf6aca7ce32f924a563acb43239db61ba6048 00433098
- 03: b250c0dc60a9a2657d77ed2b23479d3d68341ccdce9b5d1b586f278ae76fb613 00433108
- 04: d47c9556ec9760172104152f6e7c8a1788f172b238377b942a5664c9b7da91af 00433276
- 05: 8676272250d9b621e151c5088b779b2c4bcce73b7fb20f919b12c5513847122d 00434193
- 06: ef83b0a2cd711ee0e06268555072569ee8028b08e98bab1d63526520d54c4550 00434299
- 07: f272741c5d45bc7a82d0e55bcfd771b3befcee764ded4a39e032aa6d0fe29763 00434334
More details