Transaction Details
Tx hash
0bf0408bb90fe21796dc9015b5185d89cb901934a7cec3385213a5fd5571081f
Tx public key
dd07e2698cfa51da1d2a48ba44adbbb3e91e069ef62c4099d5541078029a9ab8
Age [y:d:h:m:s]
05:304:04:31:40
Timestamp [UCT] (epoch)
2018-09-06 04:07:44 (1536206864)
Block
29830 (1467407 confirmations)
Fee (per_kB)
0.003995875 (0.000985970)
Tx size
4.0527 kB
Tx version
2
RingCT type
4
Extra
01dd07e2698cfa51da1d2a48ba44adbbb3e91e069ef62c4099d5541078029a9ab8
Outputs
3 output(s) for total of ? ARQ
stealth address amount amount idx
00: 4566bb1eb9ffe31e36d447bca8589b890fc4040f9d3989262c0c8ddd2e9f33e5 ? 215542 of 4040493
01: 21b522a5b8045a935937d6e1aa4af5bac4752feb6609649c7a051096296188c6 ? 215543 of 4040493
02: 0fa1aa0cf4b614fa03d1cc31c8e63c82a9fdf3f0f32347952e50a43b7734da45 ? 215544 of 4040493

Check which outputs belong to given ARQ address/subaddress and viewkey
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side

Prove to someone that you have sent them ARQ in this transaction
Tx private key can be obtained using get_tx_key command in arqma-wallet-cli
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side

3 input(s) for total of ? ARQ
Key image 00: f138a081cab420cd84786c130895445ed27be03078b644f21cef3b370f177b91 , Amount: ?
ring members blk
- 00: e7403d4ea0214b738103e352fa9e02e4635305c7008d8005ce87ab11bf507fb2 00004624
- 01: 7be617b0697d91308439845923cd4310034042526bd41ba151066506cebe5fd5 00008064
- 02: 4d9ef4c7e39f6778a6b0406f19cacc7e3614b36ccd0b1808f7da7a7568747ed7 00015669
- 03: f429e9de48e15af4a8e69e374b9eb288adcb045032ec736957cc05f1ffb3c645 00017395
- 04: cef22d667adb632951a4a92b4492c7ec3e6788ffe151f1e16eb691fb5214ee65 00020769
- 05: 856036f163168e2aa24b260ea7797120cef4f5b1458d5db48dd63ec285deecf6 00028910
- 06: 61d9f219b14dbd3308930424ccb4211e8c25e5639cfc04f0778c8ba92f118579 00029768
Key image 01: c75232cded3eb4095f6d9a9ae05ceba501b05d1b725753e85a9d6a7762e7ad5b , Amount: ?
ring members blk
- 00: 64c3d78ae73180fdd6feb0dd66fe65daf568c796bd9dbe7ae27088b0a0b0e1d0 00007862
- 01: c8e61029d5716b5199f15e846d96feccb8413d7c249117235b56d95990b7f391 00009088
- 02: 4859c07366125c7496da723fbd2f920555ce8040ee55d9c78a2dd5449d5369cb 00013717
- 03: 1b6df0f88ac1da3bedf794e0abf7af1a7714f9f57368b911e57e8f50a95db879 00021982
- 04: 36aa4880371fb5ee888ccb803fb57892837e52773747898694f12a8850ad05d9 00024060
- 05: 359121d46930233eaccb92383d5de08432e436fd03e17dd5324b833982d3c4d2 00025478
- 06: d5def0d067a2dfe63529b0225814ed8aaa6766d0cdf361bdd84b076f39487572 00029811
Key image 02: 0f7524766e4478521d791f3334085496ccf894313a5e6cacf20cbc5d36810c47 , Amount: ?
ring members blk
- 00: 369caf01a8071b857256e596a095458db1f3edf59f266aaf195df5c95cbda1c2 00002747
- 01: 18d056152b3b1c60c7336c0b5bb2c115eddd14415f1e3244a0a090b79ece4096 00010048
- 02: a6edff4a45426f9b2b3325553486c0deac1b516fd4edf70a8bc0654d055f0546 00010339
- 03: 09609bb7d040875b6d8fba3028a7a121e0fc6d861bd7568648e623380bd14837 00013744
- 04: 8cbf0c86e4f636ed278e304896c9c6575dc1f6f11b681599f85f9b5442dc9763 00016132
- 05: 5fe64abae2a67b7d69e0c5648446d70986129cb33be27d663441a911536f93c4 00022521
- 06: 5b4e1f91d0d3f928fbe37c5b8ab95b3729cbc9378eaa70238fa93b5deded314b 00029784