Tx hash: af77d73eb173e5329c35afbc4eef9544363f3fa19779141505854c278220e5e0

Tx public key: fbb07950aebd188c836d644b441be837693934d552f59a9f177edcec5f47fd6c
Payment id (encrypted): 5359dfa36ff0a92f
Timestamp: 1534093716 Timestamp [UCT]: 2018-08-12 17:08:36 Age [y:d:h:m:s]: 07:265:16:44:48
Block: 382012 Fee: 0.015000 Tx size: 2.2041 kB
Tx version: 2 No of confirmations: 3606421 RingCT/type: yes/3
Extra: 0209015359dfa36ff0a92f01fbb07950aebd188c836d644b441be837693934d552f59a9f177edcec5f47fd6c

2 output(s) for total of ? ETNX

stealth address amount amount idx
00: 035685f08c0f6cb1cccb761988989039ef9880a17a5af9b1b6c16da3183e9664 ? 404376 of 6997683
01: b338a169f67acf7f34b29792cc8d7bb09e622efe2d73f23d255984cc12fc6fbf ? 404377 of 6997683

Check which outputs belong to given Electronero address and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Electronero in this transaction

Tx private key can be obtained using get_tx_key command in electronero-wallet-cli command line tool
Note: address and tx private key are sent to the server, as the calculations are done on the server side



1 input(s) for total of ? ETNX

key image 00: 4ca49140fc1a592cd8d75553b572ffa9324a652f72932866222f9bb89080e433 amount: ?
ring members blk
- 00: 13705dfad2e909f446a6fc72a5934b7d76608ddbeae483c5caf98bf736b408e1 00312836
- 01: 83b52eacf1bb2ac63e7b90b7b4cd55dddc6f1a2ebced86510f203e579815b398 00374984
- 02: db1745bd9404b767ae97d7948f3baaa9f0b0ca36beffa611dc1efa47d6ef005c 00377267
- 03: bbd70292c88f4e31ce340eaf717194270fdca2a0ed9c4d880e3ea85e362f3ee4 00378514
- 04: 2861aa0a05479cc78abb29f1ad9c20bf3249fda0e7a5bb0889acf2faa5b3a9d3 00379827
- 05: 9e589527038cbb8f8f686438d388eee9f734ce0aec871407114dbe2f2ee8a9dc 00380238
- 06: 6ba7e1a2aca5bc9723b926e49205d0850829b023c04da4c11564b782ecd576dc 00381799
- 07: 181aab2acd674fe7ef6b2a95d9d84326eda3f1ef381dc16bd9b09cb4ffd37ad9 00381992
More details