Transaction Details
Tx hash
68b07b5a8fad63f3885e5edc73e981b08b49e037f4677deac494379f94192dc1
Tx public key
247ea88a110976eb7d89ff080a72ff5b8c15622f10df275825a256b143e85396
Payment id (encrypted)
3948e462b8c9b1d9
Age [y:d:h:m:s]
04:336:07:34:41
Timestamp [UCT] (epoch)
2019-08-05 14:11:51 (1565014311)
Block
235770 (1261847 confirmations)
Fee (per_kB)
0.000029000 (0.000008867)
Tx size
3.2705 kB
Tx version
2
RingCT type
4
Extra
01247ea88a110976eb7d89ff080a72ff5b8c15622f10df275825a256b143e853960209013948e462b8c9b1d9
Outputs
2 output(s) for total of ? ARQ
stealth address amount amount idx
00: 8d1e82563c6b7df5d167770239b179f878c57a4e3a3df45cfc09b342970ecee5 ? 1087645 of 4041031
01: 6c97aa177c503260b79012ee2caa07c6854669410b6afb6d488fe4cf8f36f972 ? 1087646 of 4041031

Check which outputs belong to given ARQ address/subaddress and viewkey
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side

Prove to someone that you have sent them ARQ in this transaction
Tx private key can be obtained using get_tx_key command in arqma-wallet-cli
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side

3 input(s) for total of ? ARQ
Key image 00: b7d549a802ebf7dea35104aafe8dcf93b571d95702f4612e8df9bf56b92190fb , Amount: ?
ring members blk
- 00: 28e1032cdd05c3d46f63f0e0785858252e516ef78999a9d8c7575f4b00b2453c 00227188
- 01: 3933f4790f4c6d368e9a70c22b26618576b676456075413272b4737acea34c94 00232845
- 02: 2c293038769c49b9970c3e8ca7291dabc0b08592405efe40c83a461f95d32c8f 00234877
- 03: 27c2baf82d432844df2a52206350693bd2302922ad3247ddc0999d794e3561e3 00235584
- 04: afef29c2d81df5855a157efb50a6f6fc5532596017721ba7b27a55d7eececda7 00235602
- 05: ee015ebb8422fac48cca59fd0899ecdff8dc424e11d305131b2e8e7527cb6ff0 00235748
- 06: 13ad233ffc4baa5d9e942d253fddb48edd429f5d01313f6f010e601298eebf84 00235755
Key image 01: a2b6e09aa26e3eb9daf082bc576dff7f6b1a3bab9921a4d11babf9d0d01745d5 , Amount: ?
ring members blk
- 00: 2b8c6c4a9e369edecf08dc7b26e336c34afaff1067d956f83986cea364a1e3f9 00139206
- 01: 89521d47f3fdac098c6dc63562f9f59e07ea2f7d471607dfe3481a5e876e96da 00196791
- 02: 94de7a4b5fe6b9d3d849f6e5f786ac92d5e8950f6d920c8f17b02daae59a9ad4 00214326
- 03: bd08ddff35721ce0bf6346097a909fe352b0c5411c9d19c8c7bfaf8489ebaa11 00216858
- 04: 7ed07add8ccaf9c09e2b516cb9462b279441f2ecc680223827c189045b0a41c5 00231951
- 05: 24204424d0c9d9f85d05104b1969fbf8aa4ead6e45b68d9a67b1e787c7579ae2 00235505
- 06: 5da5114684e1a0c4445b098829688fdb2676c5bd88db49fd5e157875697107b7 00235737
Key image 02: 2d2b4002a2ac5cd5298b14844fb99809e319768ff721b8cc32bbce82df58e1ff , Amount: ?
ring members blk
- 00: 730aaa380aaaa80daa2dd180b65cdd227f4f274885650a08c1cf1e5699630304 00225348
- 01: 0ebf3c7f96634e99309f768cee65ef67b9b07bf254fcd8d46b4dfbdaea0033cc 00233185
- 02: 41d01dc00796aea6f322f629d2650cb381afaedd1118681ae3057aad59e51bd3 00233839
- 03: 0de02bf30a02e2e2b7a779137c9e6c4da9cdf2d3474890f657a6956d978d7c30 00234654
- 04: 96140c8e4a44e34e2011ae13147ca2ec03f821cd92f37fe2cb246a8daf8bce73 00235095
- 05: f3c4592df624a8fde6ee4732d5a24490c38054388ddceeca467fa7fb1d1e5687 00235409
- 06: 1a1612ef141e0378fdff5d81bd3c5a2697c2ec5f2550811dafa933a7201ea508 00235751