Transaction Details
Tx hash
6a93f7213e96b8c1f5a968fcd851620edfe4fece5b3afb5e9f8a7394ed3c1f33
Tx public key
66953d1e62ca156626fe57148d400eb9a0fa0bbd41e915a63f8638ea8aea29d0
Payment id (encrypted)
87e4c411b0635da3
Age [y:d:h:m:s]
05:155:13:09:59
Timestamp [UCT] (epoch)
2019-05-04 11:08:29 (1556968109)
Block
169077 (1393028 confirmations)
Fee (per_kB)
0.000029920 (0.000009143)
Tx size
3.2725 kB
Tx version
2
RingCT type
4
Extra
0166953d1e62ca156626fe57148d400eb9a0fa0bbd41e915a63f8638ea8aea29d002090187e4c411b0635da3
Outputs
2 output(s) for total of ? ARQ
stealth address amount amount idx
00: dd28792bd6f0a2bbea2f6be67eb71b4229eae5ac7cde47ea6f3d1dbc8f85918e ? 769043 of 4136960
01: bd1b559ac9e2fa0e9f64c5a675650781514574f1e7d218ba0fb0ae64468af7a0 ? 769044 of 4136960

Check which outputs belong to given ARQ address/subaddress and viewkey
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side

Prove to someone that you have sent them ARQ in this transaction
Tx private key can be obtained using get_tx_key command in arqma-wallet-cli
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side

3 input(s) for total of ? ARQ
Key image 00: bdba98c020cc8a5a4f5fad30192608123fba3b3d24f72a9f9ffb9bb66d122111 , Amount: ?
ring members blk
- 00: 00d66199935302b78e4fc338539327ad51a4ba2a086485ad95b74c0afa1ed979 00057610
- 01: 6fe7d304817f8906a06e88ff0a0ba967055e6adbe028759cd8c30ba46fbeb7f6 00074274
- 02: 5a811323ad948477bdb3d046ca1e9997ccd2d067068da6a22aa10098aaab5df7 00163301
- 03: e0a454c36c19feb4f6b2b83cedcd47a606b08b5af653152e33fda86b12dc2a5d 00168836
- 04: c6a7d006a80cf565b5d65522e930ed447660c9640985a9c692a6dad9603a5b3f 00168936
- 05: 6f905215a74eeaffacb42e168f740755360673031193479f6e7dd7ef80158b1a 00169038
- 06: 7f245fd59bbe5de9e7ed281dfd9111dc8192f39d6e1dcb95cce3c80493c50efa 00169050
Key image 01: 9d3381355bc72dcc1a3093b69fde9b4adfd98febb4c679b6b20567c0cd105d55 , Amount: ?
ring members blk
- 00: 01dbb7652e90901d916fe05f0e48b32b8ba6d5005fe604b2f003f10a28377d56 00145345
- 01: 5afa654d73ee444c1a2f9ddcd41422818463bbac7b3f1828a8ab181010c83792 00149102
- 02: 8f032ceac813218fc07e72e13be7eaaca1166de4dd4953f457b05d0b425d2d5b 00162896
- 03: 56fa13c63f98a46f5897f72ac7ca64f2b481e2879b5d579559fab7d144d9303b 00166423
- 04: 83eee982160a8525902f7df56826400e6859a34c21fba6146f87d637914335e0 00167268
- 05: 6f9a981d8110906d6f452cad4260fa280b35c9c9e3b88580807eff01d44e99e4 00169050
- 06: ecd730591c9fb578f1e4c9fb6e895d2f2da70a4a3a715fee39a7a0266f182ea0 00169064
Key image 02: 580753da854f227d149af838185f6ab573fb674ad56bbd5023a572dea251c504 , Amount: ?
ring members blk
- 00: d3cad6cec299c485151c43ba8525b9974834316b5fe71e32e6291f209166f868 00097565
- 01: 74065dfdbcfe5c71a17f2536e5bcbf5607323bc15333c1344cf688dfdc4c2e20 00147768
- 02: 44bdf2859d1a04c2ef06d27a9afbcb92ed1e92d0293c9cd7e007ccfd72e064da 00165146
- 03: 250209715ab076de9f97b85cb90f3bcab8cc74a5aaf3b17bfec7c52cf6ac0e7e 00168328
- 04: f6eccd0d0ed033e75e9042119f73fccd44e770087f265e564b89286849c89bdb 00168944
- 05: 40208d054b96256116ee791871b646c22f5096a50d23976e201547998f338efc 00168973
- 06: 239d4158189a9f5dcde5f42b32adc90632c977c763402f6c3bed8f5453c57f35 00169031