Tx hash: 345be8d3b1c16adba0b9bdfbea418cff6cd9784f615401617d96afc74c5f7d0a

Tx prefix hash: 798f5feaa69d2a6b1fe830d6ca5453870a1425c05dd7e18fabca46bf3d837aef
Tx public key: bd035167b79045c7f7cdef26f9ecaf06b29c1fc843118fe1de3b3d6f35cf2b1d
Timestamp: 1579013137 Timestamp [UCT]: 2020-01-14 14:45:37 Age [y:d:h:m:s]: 00:172:10:08:54
Block: 1081602 Fee: 0.000000 Tx size: 0.0889 kB
Tx version: 2 No of confirmations: 161191 RingCT/type: yes/0
Extra: 01bd035167b79045c7f7cdef26f9ecaf06b29c1fc843118fe1de3b3d6f35cf2b1d020800000002122eae00

1 output(s) for total of 1.72 ETNX

stealth address amount amount idx
00: 8134f5c4018e62ea4c9a8ae518ee3a71f903a51b30500444887d5695b263e448 1.72 3721961 of 0

Check which outputs belong to given Electronero address and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Electronero in this transaction

Tx private key can be obtained using get_tx_key command in electronero-wallet-cli command line tool
Note: address and tx private key are sent to the server, as the calculations are done on the server side



{ "version": 2, "unlock_time": 1081620, "vin": [ { "gen": { "height": 1081602 } } ], "vout": [ { "amount": 1721380, "target": { "key": "8134f5c4018e62ea4c9a8ae518ee3a71f903a51b30500444887d5695b263e448" } } ], "extra": [ 1, 189, 3, 81, 103, 183, 144, 69, 199, 247, 205, 239, 38, 249, 236, 175, 6, 178, 156, 31, 200, 67, 17, 143, 225, 222, 59, 61, 111, 53, 207, 43, 29, 2, 8, 0, 0, 0, 2, 18, 46, 174, 0 ], "rct_signatures": { "type": 0 } }


Less details