Tx hash: bff9aacbf1c472301fec6d480c5584cc3e3448010d5b37221d3f18061978f1f0

Tx public key: 2c966cadf141ec50154f765fa01514ae3e54e80d06c9aa3fdde89f8040a55a2d
Payment id (encrypted): 82fc2b49662270f2
Timestamp: 1542824408 Timestamp [UCT]: 2018-11-21 18:20:08 Age [y:d:h:m:s]: 07:172:19:29:11
Block: 514663 Fee: 0.020000 Tx size: 3.5078 kB
Tx version: 2 No of confirmations: 3485139 RingCT/type: yes/4
Extra: 02090182fc2b49662270f2012c966cadf141ec50154f765fa01514ae3e54e80d06c9aa3fdde89f8040a55a2d

2 output(s) for total of ? ETNX

stealth address amount amount idx
00: d9fe4f24dd825c9dcf202863f7cda9df401c41cf1eeb8de304bc67be602d4b6f ? 1325585 of 7009052
01: 41e770eeb01c824b68609c68470cf782ba0ca8f66754dd7ed0ddac114e9dcd18 ? 1325586 of 7009052

Check which outputs belong to given Electronero address and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Electronero in this transaction

Tx private key can be obtained using get_tx_key command in electronero-wallet-cli command line tool
Note: address and tx private key are sent to the server, as the calculations are done on the server side



2 input(s) for total of ? ETNX

key image 00: fe99986a3e0814f5bee4837afee9d6a1dfa146c08bffed07a4849e27b76517f2 amount: ?
ring members blk
- 00: 5cf2ca2e123ea6c19e634f1391ea42671268b834342947f33578de26bc7ef57e 00387798
- 01: eb74af14c234133573e89abcb9c70b96144a09603a05da24bd17c5921c0e4b28 00405922
- 02: 94f5978b3c73f134edec1e396bd755478b2cae32c08f586ea0fbe0fca42cf5c0 00415158
- 03: c3e902fe76f7c13a32df1b2ce5fdc5458ea012c942deb8a953c0205b0fdbc77d 00452384
- 04: bdd63ffb0c415de61eb21671b130e7e07b1051cdde3fe880b75adbdd09e09f1d 00463103
- 05: aec57cfa83847053ca77aad2455bea2061df4acd558d8a489413c56ef4517170 00465841
- 06: e520f27175e2fc9712fee1d995cd6d94ad138957be33623cf2fc8effed64422d 00493887
- 07: a4e7a2c40627a72bd7f4fbda9a9c63ab268bea021dff5a0c178224d08ab4cdaf 00504267
- 08: b3e459a4f92782f6f233fc9b583bdefa223a9cd331bb9c7fa2ef7190912e76f0 00513097
- 09: 7c4bcadfe892a5860900e16e046c3ca01fedd6f77973b2429e06b4fef5c6a509 00513576
- 10: 87e71ee87b69b87b97b5676faafdabee5cca48c29605e5a07bf69e45018b5f29 00513941
- 11: 3ff5db982770057266e552f2e2f94658b224b3f29c2dd05700af587fdd5fd5e9 00514044
- 12: e486168999fed172e9d3c3109887e2c4695e11a9e40b741a1a28554f7c31bc47 00514336
key image 01: 6a2d20d4dfe35f39bae1fdf952d4f3eaf56647c9ec7434aad823815a87aae949 amount: ?
ring members blk
- 00: bc79a85f23a7079647817eb452e6ffa75584f212fbd0f7aa588824f6e6813f43 00351664
- 01: 11ca83f6676f0e42c4e11c3f33b59d29c5da03464718a155ae6e8c76562c21d2 00409713
- 02: a85139923ffe524cfc28eba49b1d0de7a51e419c1779fe9d7287d1099616164f 00421525
- 03: 9992bed9d3c057bca84a338f29f0632125ef0e190f9a7c2def2e3af9d977d3c5 00433321
- 04: 0d54fb174d348428578cd0de595a60e673a47cf97e038d015c3d994b1eebd8fa 00456031
- 05: 57414e3843d7eac8d9be9c8ded58a8fa0617ad1770813ceb7f2a64214b56839c 00485399
- 06: 1623fbb35608fc0b6ddfe756c47bd1d700c5a6f388796dcd35d7135a07c07d78 00503007
- 07: 7fe30a018add8329cf3eea817f9d1f12d73154a9347e8e964db92611cf9ca13d 00513009
- 08: ebd44227526474005da1f828986f2692b45efd1f0360165818c2fa125ed258cf 00513344
- 09: bf8ceaab40ac9d59c7082e46902b93b7cbc67f9a531b81cf1a537f6c72644b51 00513505
- 10: cab7991add4bc8aa759395ab1281b02411cda38afae52044217ebfa19f7bd013 00514074
- 11: 00bb31712c0b56014f7c5edce39052afb2ea68f6d5ef5ef37696193c57e3fa08 00514384
- 12: a2d7877d657d5171fbce046db97fe580b570ae1565420bd3a64e263bec73eb75 00514423
More details