Tx hash: aad38e468a5404738bcd52fbb7838574d000e6d3b06ca1f19ec17a972cde1558

Tx public key: b12202716efcfd2a895932a2067689601006e33345e18a611119d389e1552401
Payment id (encrypted): 72b0f20be25f063a
Timestamp: 1535324454 Timestamp [UCT]: 2018-08-26 23:00:54 Age [y:d:h:m:s]: 07:256:14:09:26
Block: 401739 Fee: 0.015000 Tx size: 2.2061 kB
Tx version: 2 No of confirmations: 3593861 RingCT/type: yes/3
Extra: 02090172b0f20be25f063a01b12202716efcfd2a895932a2067689601006e33345e18a611119d389e1552401

2 output(s) for total of ? ETNX

stealth address amount amount idx
00: 233e19b9cc11cc0331ca819e89c3a725cab405ee5d54ee0e16545cf37bfd9fed ? 554468 of 7004850
01: 8ec023a7c41f08b69d64ffc74266e3f93ecd999cbab6aa50c40f71033a2b9b83 ? 554469 of 7004850

Check which outputs belong to given Electronero address and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Electronero in this transaction

Tx private key can be obtained using get_tx_key command in electronero-wallet-cli command line tool
Note: address and tx private key are sent to the server, as the calculations are done on the server side



1 input(s) for total of ? ETNX

key image 00: d90d0d17352fb8ef696218a3e8b0777206c703d047a008ae9620cc50968bcc13 amount: ?
ring members blk
- 00: d43efda58e9d7da6a34fbfa875fe10b6578b522cd2bcd8d29eed104262c761ff 00362141
- 01: f5f7f38c4c049ca0e50d4d22fa262713284d26608b31c8672db34d5e423a622e 00369649
- 02: 25afe478934e4deec420b081d820b45b49cb251fc8600ebffe8dd7638c9a75f0 00372723
- 03: a98bc41ca70603eb06aff1ea36a30ca5434ca4368b523e1ab8feca0a6fdd63e3 00399875
- 04: 1c765cf63121ddb2605fcad99daa1ea6f983887e95ed428bbece063d74f155e5 00400132
- 05: 81052a084868a51645380b7445b1d2f165b6c307503d4932b28301ddba6d1a55 00400895
- 06: 9d720012409529733d058c93b70a0c6941a639991a7721fe26bfb5d1b0791d2c 00401074
- 07: 7c45a540e1f30056d4f7e9ef8059a4185d8b4aa7374efe0fd33568625d96d22c 00401720
More details