Tx hash: b6af0c6967f40b82ee74de7c76c3f084fe697b6fbf83f92f0352a8c1232d23c8

Tx public key: 4f7d062c1e61b1d91ea4dd23eb919062723c4dde5e9c573ffe0fcfb12775f5f1
Payment id: 768a91900446ba11985ed42f42f79f3c1178cc509bd23ec738ec956f9525f411
Payment id as ascii ([a-zA-Z0-9 /!]): vF/BxP8o
Timestamp: 1513453352 Timestamp [UCT]: 2017-12-16 19:42:32 Age [y:d:h:m:s]: 08:139:08:30:56
Block: 70359 Fee: 0.000002 Tx size: 1.2373 kB
Tx version: 1 No of confirmations: 3917746 RingCT/type: no
Extra: 022100768a91900446ba11985ed42f42f79f3c1178cc509bd23ec738ec956f9525f411014f7d062c1e61b1d91ea4dd23eb919062723c4dde5e9c573ffe0fcfb12775f5f1

10 output(s) for total of 0.07 ETNX

stealth address amount amount idx
00: ba304eaadedd67df17d7cb66fc93d9b0f9b6ee3ed7e0d9cf36851cb544e50438 0.00 160948 of 862456
01: cf349d6af596473dd77704a6a4792cfc6ada1ef894c53e2ba18b7f7bf755becf 0.00 383648 of 1089390
02: dd946edf527c15b38539bc826ee3de8a21f9aeabfd6026e4caf17d9323bba771 0.00 162201 of 948726
03: 145da5f7cdd0b6cf153790dc991a9ed8cba3af3327bc7b81fe623dc995b8d82f 0.00 257972 of 1204163
04: 3d2bd45f595f1117b517b62ac3f4c80f34488a025606fe6635d8249561eafe4b 0.00 452619 of 1279092
05: 898571041df3a8a73c68e39f40e96eb3e4666d8efe2bec310b2fa9df10f95f7a 0.05 127823 of 627138
06: 3d5788b2b7cde6f48da7ee60aa793fea7cc2120ac2cfe97286cfbf4611bdfa9f 0.00 577201 of 1640330
07: 990779a08f146d3e4244ef5733897a4e8aebe2247a46566b18eb5b088dad249f 0.02 144800 of 592088
08: ed4babc3667ea79a830ec4de3dd8dcd18aa4a40641ba8fa4d4e5941b458c7634 0.00 1624750 of 7257418
09: ac9d62ef288b1a552cba06e5e3033f3701cbfe9230491bec0a319f81767b04de 0.00 146425 of 730584

Check which outputs belong to given Electronero address and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Electronero in this transaction

Tx private key can be obtained using get_tx_key command in electronero-wallet-cli command line tool
Note: address and tx private key are sent to the server, as the calculations are done on the server side



5 inputs(s) for total of 0.07 etn

key image 00: c822510cbfe69124048e23582ed2119944f89937b5924f74083a23e37ec6d789 amount: 0.00
ring members blk
- 00: 0a82dba9c8b04ee458ad0c4103add758e731f3cb1fe09c1412a8a4532e725dbb 00063536
- 01: 2c6f629517f456a277901fc516cff8f186bb5f9353b493cc809bcead782c20f3 00070084
key image 01: 8a3458e4737d0120ddaa24a2346bd2d3f4c8eb06bcfaea2f29be4528788614ea amount: 0.00
ring members blk
- 00: 2ba16bc220392e5834ae66253648e1edf46197bbfeb95bbcd1e20b2d4e311fb0 00068875
- 01: f2b7201391b86f562a542163c0b1cdd612be57201433bd5cd84449df2146d677 00069918
key image 02: 9bd32fd2ee7df1372749fc7f2072b696cc42b6a3b15a1938865e73f9e0b5dc5a amount: 0.00
ring members blk
- 00: f5e0d32ba5172f57ae03f54644ab2860312262c308b870dde49a0f1058f0ef87 00052742
- 01: 091f9c1d25d413c1fa7d14a9d017eb9bd50aad3492b8d102d6a15216deeaf28f 00070278
key image 03: 313cefeabe28b04ab4b9d28d18c671fb03efd3ed6dfa54707cf264e9f6a26a3c amount: 0.00
ring members blk
- 00: 4259117fc9bad0a6f507a6266713b74abcd725838d8cfb3247588b34f40b34a2 00069162
- 01: b1fde04b2d22348da4b7b78107ac59486f39245e447164c5844b15152ab48deb 00070005
key image 04: d5f5026a21df1c92ca1a75d9d58eb0db130e2d8a24d5bcd634c04f7d6a7feca1 amount: 0.07
ring members blk
- 00: c061c309420c4255cb391a3f55886bfb9b698c85959e01f2b781c2b1cce4eda5 00060483
- 01: 97cf35a0c02d6ed0a372667e44cc1ce93a4318d234f0f15cdbe06fb8003d1d15 00070206
More details