Tx hash: a71c7473f83a685ac0ea5e99ee56080fdc5db674fe48941ef1d1a09ad3468764

Tx public key: 60b3b36cd0d2c68c04ef76803c7cfbd0909b535ca99ccf6e686dad496a881956
Payment id (encrypted): d661b64719957927
Timestamp: 1543511655 Timestamp [UCT]: 2018-11-29 17:14:15 Age [y:d:h:m:s]: 07:165:06:57:47
Block: 525647 Fee: 0.015000 Tx size: 2.2051 kB
Tx version: 2 No of confirmations: 3474764 RingCT/type: yes/3
Extra: 020901d661b647199579270160b3b36cd0d2c68c04ef76803c7cfbd0909b535ca99ccf6e686dad496a881956

2 output(s) for total of ? ETNX

stealth address amount amount idx
00: d42773d8b8a4a30f7c4ece312338a7453761b59cccd3ad72c52975fab15970a3 ? 1438125 of 7009661
01: d6d61fa40634af23eec7c02de206c3f1e0f40699f588c781b2adfc0315a75b96 ? 1438126 of 7009661

Check which outputs belong to given Electronero address and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Electronero in this transaction

Tx private key can be obtained using get_tx_key command in electronero-wallet-cli command line tool
Note: address and tx private key are sent to the server, as the calculations are done on the server side



1 input(s) for total of ? ETNX

key image 00: 0ce88e0eb74966be956f48aa4e6b57d3069c232e2d4af4241265c68e5594a08f amount: ?
ring members blk
- 00: 6af6030b88c4524187a42052d142bbecd3a17df78085d16f167521b9448f6fcb 00387129
- 01: 49e53f171d8b753a34e3c0578c321ca8820a8c20209d89a850c070e31f669f6e 00392058
- 02: b557d4e8efd186265bdb12f1a9d9f889fbfcb73023397ffc604484794c60d278 00508318
- 03: d6a54f34870d3d4080c977abb60fea909fc276cff76efa32af4ecad2c91a2f4f 00524032
- 04: be732f773f48645b6d771454614add8ec2856835f465bbd4436038d974ba52f1 00524233
- 05: 9f0ac2c320bb70c2fe04b76b38acb78521c3c2bc1515313664248eb46511efc9 00525035
- 06: 644f11fe27bf85607d3664b85cbbb89b38a0d034fb3e75c1b66992f1c3be4a64 00525627
- 07: 9c56538e9e79942326b8eb3b0f9eab59a63ff0c43557727cd4f5cfd4d833666c 00525632
More details