Tx hash: e768951d4dd44ad47813b903315a32a18da40e9fac91a7159de1a5a1e57890af

Tx public key: 7625395529e85e492d44fbb602bc1580965ed5edad9f6cd5890b03507e8be1e7
Payment id (encrypted): 9c471dec405a58e7
Timestamp: 1541158162 Timestamp [UCT]: 2018-11-02 11:29:22 Age [y:d:h:m:s]: 07:191:03:06:58
Block: 488160 Fee: 0.015000 Tx size: 2.2051 kB
Tx version: 2 No of confirmations: 3510302 RingCT/type: yes/3
Extra: 0209019c471dec405a58e7017625395529e85e492d44fbb602bc1580965ed5edad9f6cd5890b03507e8be1e7

2 output(s) for total of ? ETNX

stealth address amount amount idx
00: ba1e19abeed8bac6a235b349eda049826e9cf0bd4cfea0d97f510517a6923123 ? 1135707 of 7007712
01: e8580c28c9d64f83ce2570ff1667ed79b35970314d9918711a5bb69ae54f5d52 ? 1135708 of 7007712

Check which outputs belong to given Electronero address and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Electronero in this transaction

Tx private key can be obtained using get_tx_key command in electronero-wallet-cli command line tool
Note: address and tx private key are sent to the server, as the calculations are done on the server side



1 input(s) for total of ? ETNX

key image 00: 738ff3135f2fa48c821edf38bbebfcd8909f0142d6a6f0dc80312e06674976dd amount: ?
ring members blk
- 00: e9a001011fc23ca69757e4ee6f96c6324dd2c7f776a568a2a710723640d1769c 00451345
- 01: 69a7b03e65946ee8dad91d2063a02f10a1106284e07348ee67d7a2e736e6045d 00482469
- 02: cc3860943c678d84ac0d1e688a226fc6a9b24584dff88bd11bac311ac0d028cc 00486313
- 03: 51964b4e88885526e237421f6ecbf01dc1cbb90a6088f027b3f936cea9e7cb08 00486954
- 04: 17d4d8520669022556d8fa4dab66ca52920d0d0f5083386f876cda8a1ba15c5d 00487554
- 05: bf6c7da19afc6996dc45769890bf000b97f5a65291e06b50df5f4d5425275b62 00487876
- 06: 8b05377addb25a473ece2b87300de65580f8b5387c94933dace4a8dc57858b70 00487974
- 07: b057822af6dba6ef3e991e89a9a18c97e52b7b4deb1ec6b2e29f44c2fa9a79d8 00488120
More details