Transaction Details
Tx hash
40b2fa60684a4553dc1ee2926dafd61ca4e767ebdc5d61ec861071268628477e
Tx public key
6dbbe4df373d9f895298f64b5bcae1bc8a2cfda995301fbbb1286035ddb3ffad
Payment id (encrypted)
26d7b024e419f7d1
Age [y:d:h:m:s]
05:136:05:46:04
Timestamp [UCT] (epoch)
2019-02-20 17:14:08 (1550682848)
Block
117193 (1379761 confirmations)
Fee (per_kB)
0.000030680 (0.000009392)
Tx size
3.2666 kB
Tx version
2
RingCT type
4
Extra
016dbbe4df373d9f895298f64b5bcae1bc8a2cfda995301fbbb1286035ddb3ffad02090126d7b024e419f7d1
Outputs
2 output(s) for total of ? ARQ
stealth address amount amount idx
00: 4a5e6fbca1d11efd446bb41e5232b296ae695cc66bc8ec798a02f9c4b5ea39e3 ? 569725 of 4040130
01: b131de7e398c2f5b7fd7f96c5622aee74822eda271ecb3cf879c986d672fbf65 ? 569726 of 4040130

Check which outputs belong to given ARQ address/subaddress and viewkey
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side

Prove to someone that you have sent them ARQ in this transaction
Tx private key can be obtained using get_tx_key command in arqma-wallet-cli
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side

3 input(s) for total of ? ARQ
Key image 00: f914018e1c3901f7dcae6d6cd380d8458b3f6a0a84a27cd5610ccfb88671b074 , Amount: ?
ring members blk
- 00: 67929a99e4374361525718d9a0be61bb3ff86b171e83050f8838877735280023 00104957
- 01: daa25ccd7767f701f25a16814b0d1b5a32547b002848e9189e2d390321dcdeae 00106483
- 02: 24791b4b20dcf7ccac6055aadaf35507c815a4c1c84dfa10e1026135c0fbee01 00109907
- 03: e5aaff5d31d784eeb1cfd878bdaf8ac08b74c236ee3d1c97dd4823b2219471bf 00112545
- 04: 36392c57e392efbbab76f2cd02d489df09d47304d32481a262a2c8127d1b4b41 00114577
- 05: 8f8f5c05340dd0df6c28838756713a908fdb402ddee4b3d74f7eeee85c77e09d 00116632
- 06: 9888e2a3134e0107176e54a031e2f74c6c0e1ca68692f610a4930d05a250d559 00117088
Key image 01: b5194a060736344bf5b8ed71f0a18f205eec2d97bfeac74172c575a57390cefa , Amount: ?
ring members blk
- 00: 65014fc7c67402a9b8f1953047edf9ded912368013ad2ba8f07e39fa41132de6 00096271
- 01: 1612b267e085d64236d92971d3b35c7595c3e62d2eca747ef834c3d0cfce1c8e 00116882
- 02: 4b43dc29ef3e6746eba3b9859c0140f1f158bc4a52c6adc8c0e06721d0d12584 00117119
- 03: c4f37339844c939b6eb6b60991e3d18474016d177d4be4656d76834fca59db2b 00117120
- 04: 1fe83ff65ea4d524eff0974c6974c8f8ca14b76aa35bd434bb4bcf84ac4a290a 00117137
- 05: 20d8c73f5520dc095c132b31e707c3eaef27c78825c4d178839cddfddff3ed10 00117148
- 06: 71809ef7def1344655d9d00032645c22c61e5e93d16bc75b529c3912f70e738f 00117182
Key image 02: 4242d8ae46e964d9e8709034a1e0a796c832c9087322fcbc5274eb1f56d0bb0a , Amount: ?
ring members blk
- 00: 9f8b8ebfa68d745ea3f65ecb02b23a2db3840f30448f2107964bd3c333eb24f9 00110543
- 01: 5e7f63b8f321a8517a36ccf7c464ac2fb3bed42d0961682fceef20c60d6f8f5f 00116629
- 02: 9aee35efd62dfaa405beff9c2fb84e3bc5d40d18b5de6f9701f55e611113123e 00116842
- 03: 205fab793c040aebf2fec9b2c8923e49037134b997a304edd523252ef840a8fc 00117094
- 04: 72f4e84b17c364402aa0e8eb72f7f98933a6db9c7ee3e8191fa76a3d27d259d6 00117129
- 05: 5e56ab2951ad24d386e509ef6d9eaf543065f77dec53e674ff713492c6042f5d 00117141
- 06: 4adcd2a7440dbcfd37c3b61df82ee6f49f01ee72bfe5237bf9e786323f161bd7 00117178