Transaction Details
Tx hash
2769a8c257a0b4fe8efa47ce4d63fb5c85f4f5bc1fcd4e9ffe84c7f84356b277
Tx public key
077cde8f303907b38382402ed5596ce30087031fb01b8ce6d0d5c292a867198b
Payment id (encrypted)
545aef0220087f12
Age [y:d:h:m:s]
05:174:08:07:03
Timestamp [UCT] (epoch)
2019-06-08 12:53:24 (1559998404)
Block
194094 (1406018 confirmations)
Fee (per_kB)
0.000029560 (0.000007734)
Tx size
3.8223 kB
Tx version
2
RingCT type
4
Extra
01077cde8f303907b38382402ed5596ce30087031fb01b8ce6d0d5c292a867198b020901545aef0220087f12
Outputs
2 output(s) for total of ? ARQ
stealth address amount amount idx
00: b6ef9bb178ac6d4271ab2069059e9dace126912073c670067e66a918de13029e ? 876968 of 4195509
01: b766287cde4bdfefaa32abbe873697cf2072c50c7e4aa57594bf9b3957604b89 ? 876969 of 4195509

Check which outputs belong to given ARQ address/subaddress and viewkey
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side

Prove to someone that you have sent them ARQ in this transaction
Tx private key can be obtained using get_tx_key command in arqma-wallet-cli
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side

4 input(s) for total of ? ARQ
Key image 00: dcb94dd4eb3e9d5e65b712bb8f1ade304d4ee517489753c555851743c444b2b3 , Amount: ?
ring members blk
- 00: f6a15434bd9802dcbe22ee19e65e6a39707c528ca8559e0858f2ae570452be83 00162173
- 01: 9ba0b93bf78b89abf23044be09148d0dfbfbe27df71e3952a567f05d54686f4b 00188331
- 02: acd4f2bcd129c6ab5bbbf37d8cbd7cd657c78d6ac641e9a4b8e090fdb65cf3bb 00188707
- 03: aa15019ab47e25c43e1c17c0981d3b53ad458f26c270ef4836b768282a296591 00191832
- 04: ce22cbf3481b999e2ca275f3ce309eb34e407e2762e5a912a9cb3003bf38567a 00193549
- 05: 152538281194f3df75a6c674cb2f31bf7790fa02995bcc03f37ba534f2510833 00194020
- 06: d64e32bddff8d141185a8b78be4c2ba77a6db52729399aa218ad8fb37d87ee41 00194068
Key image 01: b4518fb45717e3b3f982be06923217e9f69a11393400b09f996c3a55fa048842 , Amount: ?
ring members blk
- 00: 10a2a4035a582c418f27ccb14e1ecb9be5a646c6dcc1a76ede0f09e1012d29f6 00045373
- 01: 75246f1d1013dad8f9d052f96966f66230fda82a6d760ba1bdf6c061de01e0d8 00083965
- 02: ffc93f009ccae461586933d64117f3be579f6e25507aa1b64c62fe40d28122d6 00175237
- 03: 334a6ceaf3407377454172f0edc7065adc58162f92252452b413692387e2ad78 00190050
- 04: 070ee65afc5253d199bb1bb0cfff4dd5b4236a6d4fd4f00fa5d36521bbcfa773 00193664
- 05: 7c62aa962090ce9065c9f1f36004ded81d3cbb7b6e1c50441dd97adefed8f10a 00193976
- 06: de6d19faab6216f4b9108c78db76b35f85da0c1d358fb14124ac87058788a03a 00194066
Key image 02: 65d3045420ebe79459b4fe8873e3f3d4fb2372a95063dd835c89e6281f8549f4 , Amount: ?
ring members blk
- 00: 58d072fc9ff6177e22db3ccffc3ad91f059309f2bce84a927586f89b58ef9a40 00179779
- 01: 0b2d3ea69a17f5beed44557c0dc6771ebe5e6df103c1ce017d884678f5bced77 00192857
- 02: 40c16c32ca99588498a819d855304710659e620d009df800669aa027dbfcf7c7 00193355
- 03: 2fc00974a9472e523dbf2ac98e4c8835dd120c098e245a9e855a0b222ee3a703 00193846
- 04: 271ad9e8990e40d96b7e7c34012734be7bcaa408eecfa9ca1a89537b9469227b 00193965
- 05: e64374a362be0945d35e6a0631e5453f3fce2698c4f56212c4677353d4f6575a 00194059
- 06: 0957d9f76c6f0daaffc928d4941c6f701bfba9a95afbd2d93ce08c8be8df973f 00194073
Key image 03: 02fc7f5637ed8f372159d08d6e0f4f43310a8a1e77d5140a1d638a90a6c16f47 , Amount: ?
ring members blk
- 00: b832d989acf5cb058e0843b6dc37d0f3f3e1b5ac584212a3d53a601018c04fb6 00185293
- 01: b5032ee75fd2a26a0e3ac86f29bc93a7918e02560ece2e33b70a9ca7ed71077c 00192645
- 02: feabf9c8d1f3c8bfa223a29d527737de6b81cf17017270065721916e43b9abff 00193193
- 03: 50c1df21940b5e294ebaa4b6be6b2e325c2a7bab5cce342eccde186fc2c17cdb 00193368
- 04: 39126ad88f8765d768cee99c2094065c24f75eb27d848bf6287debe1171c0e88 00194002
- 05: 2d3cf82da2f09293edf956451b3ef3d652317600cf2a2ccbdb6f2c04cc958528 00194037
- 06: 29f941b21f4a3cdad70ed4ad1e54bd5e1f46c5e10c1ebd40ec3131714f53fc28 00194070