Tx hash: e4b3830a6dce0fd1a828fe0e314fb5fd90da859bf094c239638a7574ccc556c7

Tx public key: d040e0999d0b8729ae3f0c44d4ae9f2fba3b7c2149499f4457c8d73c37c1d2fe
Timestamp: 1536052730 Timestamp [UCT]: 2018-09-04 09:18:50 Age [y:d:h:m:s]: 07:242:14:36:13
Block: 413402 Fee: 0.015000 Tx size: 2.1953 kB
Tx version: 2 No of confirmations: 3574452 RingCT/type: yes/3
Extra: 01d040e0999d0b8729ae3f0c44d4ae9f2fba3b7c2149499f4457c8d73c37c1d2fe

2 output(s) for total of ? ETNX

stealth address amount amount idx
00: c889c3c22319ef6adf65e3090908cf795813f1d90fe708d0f54eb834d650643c ? 635936 of 6997104
01: 296e6d50514deb61a0384479f45fb186268addcf2f34f07c101ce664d1e6e5ab ? 635937 of 6997104

Check which outputs belong to given Electronero address and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Electronero in this transaction

Tx private key can be obtained using get_tx_key command in electronero-wallet-cli command line tool
Note: address and tx private key are sent to the server, as the calculations are done on the server side



1 input(s) for total of ? ETNX

key image 00: 0a6402c0f2b4c6df6fa3aacd8e3df1850d88ea93622623e3c4d697d43da9d6c9 amount: ?
ring members blk
- 00: 319eb9132ee5d6ea5cfcf325506d9b9f7adadf1da1054b7721f1c1842850f2ec 00327999
- 01: 0af813b971a8dda2cdc2fa16790b7cc0be33f08dd6bbd6719768d985dca2d282 00387009
- 02: f59291b120e0d1ab72110211f7fa7d98e0f9740428f58bd407aae87e2506709b 00395558
- 03: 98e54f91202d14285a0cf9e4cfddd8a79e1accea8f58a5f286f8d639fecae6fa 00411176
- 04: a021054d064e6d18b3b0bca76a2ca656daa8f7612675e258477d365b54a4cf15 00411693
- 05: 6011e9ecbf965c115faae8402f44ef9c8c11d7c2e67a14444310b38b29f03c7a 00412009
- 06: 7c10179f24cc8d34283f8a27fd195659051ba56298c02e5ea1107f92504f3539 00413327
- 07: a75d0521924a403fe8d20ddff8719e376db52b902ef973e7854b135b27f11ba5 00413385
More details