Tx hash: 6f0a811adb13b19e54a4628f2afb07bf0997189e8b20849b590107f67abe6a25

Tx public key: 1e9de35e2e72f81a751771da00309c795933dc91e26c3cf0cbb7adb008246137
Payment id (encrypted): 328432a6000392af
Timestamp: 1534337360 Timestamp [UCT]: 2018-08-15 12:49:20 Age [y:d:h:m:s]: 07:267:03:28:03
Block: 385905 Fee: 0.015000 Tx size: 2.2070 kB
Tx version: 2 No of confirmations: 3608485 RingCT/type: yes/3
Extra: 020901328432a6000392af011e9de35e2e72f81a751771da00309c795933dc91e26c3cf0cbb7adb008246137

2 output(s) for total of ? ETNX

stealth address amount amount idx
00: bcd0383a2fbfa42461117b92f38321bc27919155f7803160edc00191d2cb4443 ? 431385 of 7003640
01: 537d792afc22694505d31231c1839f1686eb510a26ab431126c6611fec75bceb ? 431386 of 7003640

Check which outputs belong to given Electronero address and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Electronero in this transaction

Tx private key can be obtained using get_tx_key command in electronero-wallet-cli command line tool
Note: address and tx private key are sent to the server, as the calculations are done on the server side



1 input(s) for total of ? ETNX

key image 00: c5f47ccca6a6a06123ef45a6c5d98ae4136913be4faaf8c1f92fb5cd0fc78b9f amount: ?
ring members blk
- 00: 6dc8f13f8c68584290f2e03fd88cf1625bdc0c433f5ae29edb50a901fca1ae82 00359547
- 01: c88f9bc7971053fa0cea6f9cfd4b36f3cd9af07d7762841c589a401c8225bfca 00361896
- 02: c952022fd0ada534ecaa61276f162d3109e48ad4fc6d1428f824ab0099386e6e 00367625
- 03: 696124f06fa354b078f6286ee5271393c0fd0210bb2ff427746b0ec94c68a5f6 00374859
- 04: 2a01c6cb2f00a49ca16afc9a6edce95257903619dce42c27c8edfa580d57d537 00383614
- 05: 7f2257c0f0bb5debd0262a5ff555b3d68a845d3c676d4d4b76e8e1aee98c8134 00384723
- 06: 563dcad2b494a6560b9ecc552cc321411137b0da9bb1147ab72e1e127ce9ce5d 00385231
- 07: 8ff7f897060010775dc600b039f4f714ab0a1b822d1845d3ae3d2bcf86cdf622 00385881
More details