Tx hash: ecf80f5bd589f6c04a2544ad9462223612136d73c005e0f664435cd9b8063e01

Tx public key: bbfe2790588553f35417494d51409c1288b4884d25ee4ea61724a4e41cacccac
Payment id (encrypted): de5c03fdb3387c24
Timestamp: 1543931562 Timestamp [UCT]: 2018-12-04 13:52:42 Age [y:d:h:m:s]: 07:153:12:01:48
Block: 532394 Fee: 0.015000 Tx size: 2.2051 kB
Tx version: 2 No of confirmations: 3458356 RingCT/type: yes/3
Extra: 020901de5c03fdb3387c2401bbfe2790588553f35417494d51409c1288b4884d25ee4ea61724a4e41cacccac

2 output(s) for total of ? ETNX

stealth address amount amount idx
00: d1e171d4909dff65c51881a32ca9d0bc14edad5a8a27a99cae4a6575ac0766e4 ? 1515004 of 7000000
01: 830c53f897b8f723703d51ed0429d04a155dea9db001d707bd2f0027038f0f7b ? 1515005 of 7000000

Check which outputs belong to given Electronero address and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Electronero in this transaction

Tx private key can be obtained using get_tx_key command in electronero-wallet-cli command line tool
Note: address and tx private key are sent to the server, as the calculations are done on the server side



1 input(s) for total of ? ETNX

key image 00: 9ff3f59841b5709d86354d1a64b80177f405e131af6f84050a5d3b28d8fd6aaa amount: ?
ring members blk
- 00: 13417edc8797b4e9b4845a06bd85d50d9589ac08efef4224e8bb54e5b2aede98 00382304
- 01: da5ee9e33bb47d33e0b1a2b14449cfdb8b314ccd0b79a3066845ed37c0999005 00383261
- 02: 969a7805cdf0baadf6206837533fb6892750fbcdcc122c0ffe08dd17673a11e0 00530186
- 03: 9d33aadad46b41b15ee837914c00ac4b214f4d0e0847cbb091e4e432942a5c56 00532012
- 04: a8b450feabd8fb89c674b6e3e70ddbaee7cf7966a9fb3a2377de84979791fbc4 00532035
- 05: 936ef90eb4f718a9280c1fcf68fc57a696ba966de918a5bb343404fd7e2fd5b1 00532104
- 06: 33d2d8cc118062d2564bc3795f2597dde9020028634560fa4ce6db2fba875b1d 00532277
- 07: a8fdb72ac0f40adbbb04e07cac676c8f1604b4050bd36469cb2009451d530738 00532379
More details