Tx hash: e19851f63664e64062af359bea1feb3a11f037e372d8583b80adbeb054a25176

Tx public key: bbc7774e476084a038bd0da147a8191fe10f83cb851f11cec11db06078115444
Payment id (encrypted): 8923a79ad12319af
Timestamp: 1535165439 Timestamp [UCT]: 2018-08-25 02:50:39 Age [y:d:h:m:s]: 07:254:22:10:25
Block: 399176 Fee: 0.015000 Tx size: 2.2051 kB
Tx version: 2 No of confirmations: 3591514 RingCT/type: yes/3
Extra: 0209018923a79ad12319af01bbc7774e476084a038bd0da147a8191fe10f83cb851f11cec11db06078115444

2 output(s) for total of ? ETNX

stealth address amount amount idx
00: 339cfc6ddc0b38e7ed570f371a6f31097a18ec98a3d1698e1bd9cc638b1aa89d ? 532955 of 6999940
01: a47d484d39d4b0e705c4ed5ded4fa553730452e9dd4cbb32fa19e96d70bf3b49 ? 532956 of 6999940

Check which outputs belong to given Electronero address and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Electronero in this transaction

Tx private key can be obtained using get_tx_key command in electronero-wallet-cli command line tool
Note: address and tx private key are sent to the server, as the calculations are done on the server side



1 input(s) for total of ? ETNX

key image 00: 0cd92151e7e6dbd6c57f7fdad84b34176176d3b31501e15362320d4b30f8b19b amount: ?
ring members blk
- 00: f704aaea1d473675c1c4c1023a9b01766589a389387219c539a6a9a50851ef6f 00344670
- 01: c23fb48d42b33daddff7b2532334dfb29049a42c22149a92ee80b609fa5982f9 00372572
- 02: f2d7725f515735474a9218ec519a013c45c650cb34dad6e3e663f58e370fceb0 00395288
- 03: 70cd1f4f0093fbf93b2bf3e83e4f96d956e6c0d75915d31e8b5c5d117469f31e 00397615
- 04: 4f12010957a0be70837718f7b68e783e20bed6d7bddac1fda1c97d11e69a27ec 00398303
- 05: a58685637ea2e8f08cae0470374afc72adf9a485705811f3365203ca2364ae8e 00399106
- 06: 84b0e622ba51c66c48d0611386682d8c78b9ffe4a24d5a03a99ca1f1a6b4996d 00399153
- 07: e3cf41428e25301f417035338108ce5f8677c9c15af377efeb1e49b9e8a8a934 00399156
More details