Tx hash: 61a82e90256a416d47fe718603ceeb9f16ccb3b46edd59a9ce98b47cb4205087

Tx public key: 1341408d19368584f03f914aac08921055d2578ed58e181f59a6cd94fd8cedc5
Payment id (encrypted): b9ed7ca2779a4b1f
Timestamp: 1536084064 Timestamp [UCT]: 2018-09-04 18:01:04 Age [y:d:h:m:s]: 07:251:06:10:58
Block: 413908 Fee: 0.015000 Tx size: 2.2031 kB
Tx version: 2 No of confirmations: 3586503 RingCT/type: yes/3
Extra: 020901b9ed7ca2779a4b1f011341408d19368584f03f914aac08921055d2578ed58e181f59a6cd94fd8cedc5

2 output(s) for total of ? ETNX

stealth address amount amount idx
00: e4102cd8843cef50e5dd10ff7850a531af2727aba75565ca43272268ba472901 ? 639522 of 7009661
01: 1422f3ac71db2940c7179fa1af84d05c64253e7e06076148481720e68ce2aba0 ? 639523 of 7009661

Check which outputs belong to given Electronero address and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Electronero in this transaction

Tx private key can be obtained using get_tx_key command in electronero-wallet-cli command line tool
Note: address and tx private key are sent to the server, as the calculations are done on the server side



1 input(s) for total of ? ETNX

key image 00: 39aaa671aa18499c399c20e54a2399f4937404b3ddbf1d1d63e7c4975779f937 amount: ?
ring members blk
- 00: 23d852e884a977dbec1b1093259b88dc655c5c2fc77a0a14a3e0d034206a20a1 00365641
- 01: 03ab91c785e84144870e6a7ad32fe8ce3a4744b6fd1688a676283b97b9694793 00367601
- 02: ce36d28362598ec342042e5c4612a7314c749bca119dcf3c20161ec40d1e25bd 00413101
- 03: 1347662af01d2cf35382c40f618d9031cf3a58693c24854191ace71c03922f32 00413112
- 04: 5a95e08311e73e0cc9dc07f0666e7c7f5a8ff3467d3139e177db32abd6a5644c 00413160
- 05: 5a7aa788550b3fa464b7402b5f740e25312912752e9aa7325d8d1faf4c5ddf1c 00413365
- 06: c416202b2616ba79d7bc0c8883048f9a6e68d8c12f29f39956cc49b26c72b3e6 00413751
- 07: 7662210ae594f1f511c21f434336e7f1f3a2f24f5651b575db795e79b4d8cc7e 00413884
More details