Transaction Details
Tx hash
6bbd395652b9586a16200f06c1c031d0fe8c0b2eca3141b868fb0f08692ed866
Tx public key
28ffe9b2309a34a89137406e3f15f73deaa80d9ba7e7a5f94b651fce2514f4f0
Payment id (encrypted)
fef8c0ceac1564c5
Age [y:d:h:m:s]
05:218:06:15:29
Timestamp [UCT] (epoch)
2018-11-30 22:36:30 (1543617390)
Block
60110 (1437024 confirmations)
Fee (per_kB)
0.003150884 (0.000964576)
Tx size
3.2666 kB
Tx version
2
RingCT type
4
Extra
020901fef8c0ceac1564c50128ffe9b2309a34a89137406e3f15f73deaa80d9ba7e7a5f94b651fce2514f4f0
Outputs
2 output(s) for total of ? ARQ
stealth address amount amount idx
00: f7e21aa2038921669626ead3b8c7315f39ea52e64db5cfcfc75804a34aa12e3e ? 329645 of 4040352
01: acd8b36f57fcf31ba9eb6f559940d2240c4acb6c351df981ac8ec37d4f37e088 ? 329646 of 4040352

Check which outputs belong to given ARQ address/subaddress and viewkey
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side

Prove to someone that you have sent them ARQ in this transaction
Tx private key can be obtained using get_tx_key command in arqma-wallet-cli
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side

3 inputs(s) for total of 10.180000000 ARQ
Key image 00: c1727b22110d4c5ed443781695ffca61aee8e3947f6c9bff58a9b750067ef1b0 , Amount: 0.090000000
ring members blk
- 00: b163cd420a2ce99f3080bebb8c57bcbdf1cdb458d7715d8adc5f0a37ac2dba2d 00049088
- 01: 0206c399c3814ac617207ee70b1a94628b224fe465cd318763dda89db460b103 00049442
- 02: cc688938e0022e224b1ccd76c6d57062539872c6dad0329ea1b5ae5861f66a4b 00049744
- 03: 4de17a6c573ce6c7c0f0eddf0814323d1bde1797f9e6c4ce90d890f627603b6f 00059640
- 04: aff6ca71229d6a42f063e8f9c02029d1d9b4b5bb2fa14620b21a6f86e4efe536 00059848
- 05: 0a34fc3de176b4a08c29c37c5f59058acbd2d11bcd86fba57dea8a3294bf264a 00059968
- 06: 5b716cd361f4dc1b33e1127ca36d8ec0f0133b84b890a0adcdf7b86cee645557 00060064
Key image 01: b7ab0590663cd41dd424c2d58282c791c8dc158570f87290070e538090a177a9 , Amount: 10.000000000
ring members blk
- 00: 47ba287a778036a8006999ff524ab5f53acb472f0d27fb1d8fb5fbdd70ad4143 00052696
- 01: 94ba8897b0d0f8342d37598e6935aa26c076f2efbb233102b0050d37deab68d3 00054939
- 02: 50018c5f51fdf5f52ab5fc00d00613bc5837ab59734ccab96223b2c185278152 00055825
- 03: d614fb452bd15eedfebeae084549a3c963e81f52d7db20a3a1604a6050212e60 00059505
- 04: 22a54c63c31ff43b82afecc356b81709db10444d4bfbff2f028c1572f4c86744 00059847
- 05: 3afb40244fde01dc8505533ce6353abdea17087bb5c5b0432fc5cb3dfb635952 00059893
- 06: fe67bdfde2928e8d5e24f7c7961f9e035e63c1af33663289d6ae1a1f5b864b00 00060072
Key image 02: 2340d61a6c72823412ffefcab7af49fdd604187753c207d93b43f9c8ac65979a , Amount: 0.090000000
ring members blk
- 00: 72195842257f81858614e88eec10df79b10f48853f3b8a834678c15efdd432dd 00049396
- 01: 3bece79f47b6b0561b369ed71bbb1e03717a5a3ecf91e9c18d536ebf3c49bec1 00049620
- 02: 171b8d7c32b45d3cf4e6cfca7d9258627e0ed6f690c369f6f6c9b3b6016b409f 00059561
- 03: 4c30faeff6636c67511fcb351b46dd19509bff4e6b75157c2d52cb2b33044169 00059990
- 04: 25e0cefe3895e5a6471f25b916151ba10b594222b8e555644aa164432c095dc9 00060070
- 05: 5b8b633141832da7483e6daddd56f72aed0591e2eb8bbff2e1652e2bdbf57ade 00060077
- 06: 520ce9d36267ab20a65ab47fd1465f35289629bb9a4b391d942be0a394842ce9 00060083