Transaction Details
Tx hash
53dbe74fa4873d62518e02f2f5a8ffe1a7af539899533948be33e7cd6852210e
Tx public key
aab7600f8cb3539506f67c960c198fbd828ab2f634f522ebc1d3a3f87b73c346
Payment id (encrypted)
6cd181fe56ae76e2
Age [y:d:h:m:s]
06:003:14:04:10
Timestamp [UCT] (epoch)
2018-11-26 11:12:30 (1543230750)
Block
58524 (1541723 confirmations)
Fee (per_kB)
0.003153264 (0.000962140)
Tx size
3.2773 kB
Tx version
2
RingCT type
4
Extra
0209016cd181fe56ae76e201aab7600f8cb3539506f67c960c198fbd828ab2f634f522ebc1d3a3f87b73c346
Outputs
2 output(s) for total of ? ARQ
stealth address amount amount idx
00: 6896c3c03fed82dd25530fa36469048da2f1bcfa7623ddb261f761a5454dc646 ? 325142 of 4195700
01: 9ef498a2e138680fa0eff8ee349bc78dc37ece77a0012f8a24a34dd2f7b84030 ? 325143 of 4195700

Check which outputs belong to given ARQ address/subaddress and viewkey
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side

Prove to someone that you have sent them ARQ in this transaction
Tx private key can be obtained using get_tx_key command in arqma-wallet-cli
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side

3 inputs(s) for total of at least 19.000000000 ARQ
Key image 00: ee595a499791043f047b6d90f8f0b56cde22ef3fd935c18034351f512be9bab3 , Amount: 9.000000000
ring members blk
- 00: 8f413de94ab617e42c2f92e6f9a8ecdd55c26551d5e2f8e6a31ff9a3d11b22ee 00040156
- 01: c2908ec5cd47d0a0417748e7339bc3f984513a76ac53d3bb969d111a3fa3f3e8 00045330
- 02: b813c9077415c2b5485c40933df97340844cb04a72a2516c7ae58279d69cc3bf 00048376
- 03: b3fb545800c997768b910c71a6fbad76c0bdb1581514b26118f19063a2b1cbe4 00054360
- 04: d5687a34d3d394ea32775fa37b131c771802aa936f1a77248e0374fda19f4c4d 00056066
- 05: 1ea92b9f051342f6c7409e671405bea8d35259a56c3b9ac9514d0ec1f81f21da 00057322
- 06: ab7aa067ab716750b32b1d71dded089f5755a444fec5250b031590c9ebc0f63e 00058330
Key image 01: c24de877289e80aca36927d28994fe9c7ba64f748f97a98018c73028619e06c9 , Amount: 10.000000000
ring members blk
- 00: 0d2f272347d59bb5511a63c0acc60cbbcbc0b7a549b6e8aa39997701f7bc7b71 00035842
- 01: 6c64691041027a3c1cc54f80acaee9b59671cca62073b82df9a0a19be638f427 00043052
- 02: b7d7940774f0c9f46aef0efa84f1d5ab4ba5778f60f11eaf66efffe0e5068395 00045173
- 03: 57ea0caa25e271e61421b31ca49986cdbd0dcd7007d2c9abf7a80726866caa25 00053357
- 04: 093a4a2e1e429548e2a7c47a61531ff2dcff0d4e74635f7d84a588dc2dcc252d 00054753
- 05: 5d40bf9f1cca7614c5b4a80dc74bde98c27a735db384fcf7c9f4d912bc49ef55 00056828
- 06: 4a5006039e42321c89890ae71ff65865b34fce477b5e283b042501af7603aa78 00058492
Key image 02: 528c8e7fec28cef9cdddb2ea8e7f19244441158a29268e2dd4b5e25c72e0be81 , Amount: ?
ring members blk
- 00: 62b6e893cac553b282b1018a32c23be69323d8d95dd804884c0b9c4cb684ad23 00031239
- 01: af1b4eabdf39efa571e993e6e73c3616eb2ff631dfd1ad2af0d4a1ec0474f079 00032435
- 02: 108c9a17e84230b7626da170f1ff9081b15f0678a41b7a16a1dc173b177bf702 00035327
- 03: 6bc682e078cc141a3cd6d71fab7e2b9f3bc9b03181bb2bb80fc7a11dfbcea4b9 00038299
- 04: d4cd783ae24f5f53f517766ca9785c05bbf83e409a4386ceb6d438160c0b99e9 00038969
- 05: 843620ce0e3158e843ee5824eb2f703077c9c58eaf2790bcfdbb1bd9ec897b66 00048853
- 06: 932cc04faf11681e0e7d39ab77f9b565224eefce81876c2fdec0f2187cdc9cd8 00058510