Tx hash: 7ad8d6f4d3b4b06d09ab57a0d6ce1b06421b437062fbef5b5ccc1281be7742c4

Tx public key: 6dcb16b3a1678d74dc1e1ee5ba7978f02602cf37cbf84119779e2fe6376625db
Timestamp: 1540284339 Timestamp [UCT]: 2018-10-23 08:45:39 Age [y:d:h:m:s]: 07:200:20:58:06
Block: 474147 Fee: 0.030000 Tx size: 2.1973 kB
Tx version: 2 No of confirmations: 3523803 RingCT/type: yes/3
Extra: 016dcb16b3a1678d74dc1e1ee5ba7978f02602cf37cbf84119779e2fe6376625db

2 output(s) for total of ? ETNX

stealth address amount amount idx
00: 702559ae5c94fa7192fc65b54dec6b5c3dce16692a1b48a9e560ed0fde9e7795 ? 1023369 of 7007200
01: 19eea33bb036dd456c61db9675eb6beea73cf55e36111a8fa2f2a476a44bd752 ? 1023370 of 7007200

Check which outputs belong to given Electronero address and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Electronero in this transaction

Tx private key can be obtained using get_tx_key command in electronero-wallet-cli command line tool
Note: address and tx private key are sent to the server, as the calculations are done on the server side



1 input(s) for total of ? ETNX

key image 00: b3457119801a5b8dfc91689ad2b1a2da7aac2277d228bd3bf29a8f3b560bef02 amount: ?
ring members blk
- 00: b1c0ed5d10a10542a597da1fc495c58096288e70674b4b6795737bf86e64e950 00414015
- 01: 972d7a6651fa8f1023a50a4fc96d2ac73d95d6bacad27d1b3dee6a4643f149c6 00416662
- 02: 150509f743844f279ca80e2945490f5b85cac40ee9e9ee61fdb3d3e440963905 00420823
- 03: cccf3f371b58829ddbeb10ced1890edcc378447510e7d53df88dbe173b1c4be3 00448574
- 04: f41a552d1255ac8d733123c7b42b2348f54bc7b5e92f27749334b54d67f61b43 00473314
- 05: c04037e61a2ea4ceb983d44fa240d9c1d749aa3150aa5c3c0da6d6612fdc7836 00473662
- 06: 378c925014ab401960c7ea50559c163af67930a83ff8e7420c295d2ca7f0bed4 00474070
- 07: 0d5aa2603900c3f1bb484f3917d041c2c9c8b923dd126201ea025a68d0928917 00474124
More details