Tx hash: b1ba2ac337ffc24533f05bad4fc0b434bb70cdc6e980fd35570cbe6f4a4ae55c

Tx prefix hash: d73a92e451a971575dbf067db3eab968159484c62d34daa9e76dbb40e26fe2be
Tx public key: cc1db08315ed8f84630107dec2ded1a127b837c51aa8d2d88f7b768ee8c1a19e
Timestamp: 1533415630 Timestamp [UCT]: 2018-08-04 20:47:10 Age [y:d:h:m:s]: 07:274:21:23:14
Block: 371132 Fee: 0.000000 Tx size: 0.0898 kB
Tx version: 2 No of confirmations: 3619166 RingCT/type: yes/0
Extra: 01cc1db08315ed8f84630107dec2ded1a127b837c51aa8d2d88f7b768ee8c1a19e020800000004958c9a00

1 output(s) for total of 9.45 ETNX

stealth address amount amount idx
00: e32ad4bda856e213c6bbe3e3cd56f9480a5670eb1e954bb029ce57121254eaa1 9.45 336361 of 0

Check which outputs belong to given Electronero address and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Electronero in this transaction

Tx private key can be obtained using get_tx_key command in electronero-wallet-cli command line tool
Note: address and tx private key are sent to the server, as the calculations are done on the server side



{ "version": 2, "unlock_time": 371150, "vin": [ { "gen": { "height": 371132 } } ], "vout": [ { "amount": 9445190, "target": { "key": "e32ad4bda856e213c6bbe3e3cd56f9480a5670eb1e954bb029ce57121254eaa1" } } ], "extra": [ 1, 204, 29, 176, 131, 21, 237, 143, 132, 99, 1, 7, 222, 194, 222, 209, 161, 39, 184, 55, 197, 26, 168, 210, 216, 143, 123, 118, 142, 232, 193, 161, 158, 2, 8, 0, 0, 0, 4, 149, 140, 154, 0 ], "rct_signatures": { "type": 0 } }


Less details