Tx hash: 679339495d6b712ee1a1c29f27aa779ff8e01082f30fcb1d758755f8312d24b9

Tx prefix hash: e86b5ab73b370d6295f85f78ecae24e4835c0e118e2f0730cb5d8f6c83a960eb
Tx public key: e8ec1cddfd23adda2ed2295a5adbe1bfa7d5584e8d3794776718cfd1e01200e5
Timestamp: 1533479031 Timestamp [UCT]: 2018-08-05 14:23:51 Age [y:d:h:m:s]: 07:279:04:05:30
Block: 372143 Fee: 0.000000 Tx size: 0.0898 kB
Tx version: 2 No of confirmations: 3625145 RingCT/type: yes/0
Extra: 01e8ec1cddfd23adda2ed2295a5adbe1bfa7d5584e8d3794776718cfd1e01200e502080000000d3f562800

1 output(s) for total of 9.53 ETNX

stealth address amount amount idx
00: 53fc250aa399852266ed90a8bde434dc2df25a99828ead9e4d7c7e109bb5c4c5 9.53 342770 of 0

Check which outputs belong to given Electronero address and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Electronero in this transaction

Tx private key can be obtained using get_tx_key command in electronero-wallet-cli command line tool
Note: address and tx private key are sent to the server, as the calculations are done on the server side



{ "version": 2, "unlock_time": 372161, "vin": [ { "gen": { "height": 372143 } } ], "vout": [ { "amount": 9525190, "target": { "key": "53fc250aa399852266ed90a8bde434dc2df25a99828ead9e4d7c7e109bb5c4c5" } } ], "extra": [ 1, 232, 236, 28, 221, 253, 35, 173, 218, 46, 210, 41, 90, 90, 219, 225, 191, 167, 213, 88, 78, 141, 55, 148, 119, 103, 24, 207, 209, 224, 18, 0, 229, 2, 8, 0, 0, 0, 13, 63, 86, 40, 0 ], "rct_signatures": { "type": 0 } }


Less details