Transaction Details
Tx hash
b6e96de4580c8577859262d172f3d823c187d7846143e52bdd6323ebdf9f4a36
Tx public key
c6818a43870a9a119dbf4b422861de995029823d91481b1a935e90e9ea6680d0
Payment id (encrypted)
e1cef0c9b9906282
Age [y:d:h:m:s]
05:191:17:54:02
Timestamp [UCT] (epoch)
2018-12-25 20:45:22 (1545770722)
Block
76689 (1419305 confirmations)
Fee (per_kB)
0.000031280 (0.000009573)
Tx size
3.2676 kB
Tx version
2
RingCT type
4
Extra
01c6818a43870a9a119dbf4b422861de995029823d91481b1a935e90e9ea6680d0020901e1cef0c9b9906282
Outputs
2 output(s) for total of ? ARQ
stealth address amount amount idx
00: 3b934b99f376ec9bc742fab23bc99c40edbe1e8bba983b87a13d06115c16af96 ? 385496 of 4038830
01: 3ff04a70b9cd878c4744367f1929d5b3d3d3072462299763740506df554d1239 ? 385497 of 4038830

Check which outputs belong to given ARQ address/subaddress and viewkey
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side

Prove to someone that you have sent them ARQ in this transaction
Tx private key can be obtained using get_tx_key command in arqma-wallet-cli
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side

3 input(s) for total of ? ARQ
Key image 00: dd642dcf3ebbf5db72536298f7b2d4b477031802260392f508a5c3656cde8ad8 , Amount: ?
ring members blk
- 00: f66589154899b5e04cdeafe93bef289e6f09991d560756a332a0d16f880584e1 00065986
- 01: df73ec336a5f03e5b9320460a20990109797b449262bb46c3279079032ead616 00069884
- 02: 49717b60cdbc787dddd81a0fa0e61f0f004c1c1ee7e2b6ce194d6c8baf50d4e7 00076415
- 03: 78a7e3d760cc666b4baf583ab3dc5f37ee83dc644ec765000e0cda628aae751d 00076428
- 04: a3ee860f73cba14c8e3c428537ed93b71841d02e90b86efeb364737faa6fc61f 00076549
- 05: 03ce3da17bba5cd296feada8f0ef99a0ce5a222ca9520e64627897b214c68d7a 00076549
- 06: c17a830c6ad685cf108e2fa8d6919617c2f22a30c393f18dacf3ccc9b3d86455 00076643
Key image 01: a0eeb3a82c2689519fb0237b487ebf6812c18b1bbf2828526792092857977c9c , Amount: ?
ring members blk
- 00: 8c37bf2bfb5794e7466c3f778b9bd5601c631e0b5d17aa9fd44dac681663721a 00030899
- 01: 9b90c9948e3b8cfaa10d07a0bddcaa0350bf580f78b0241ca9b5ca44d1bdd68c 00072374
- 02: b539ed5f8dcb6a2f5097c88d6dc8afa116c7a12e27a658134f68c9ea3ba58ae8 00076300
- 03: e4722f7683165e9921311ce3b32545d85392278d758b4411fb5e75ab96c099a7 00076522
- 04: 1f41d11f85d60f127a9e4ae3db8fc5a249a131b106a082314b4293b86dd042b9 00076614
- 05: 29285de8b447a89d1ceff8c7c6bd22097c4c864f3366b5b381fde19a58bdabd4 00076632
- 06: cdccd22508c95674a3db77d44fb7b5e496bb5f228cd8d2c1aa48415c6abb6237 00076643
Key image 02: 66175d4d09c16ae8a3a40f530e7afa87826d1368da9f32ae689edbc9edce5c72 , Amount: ?
ring members blk
- 00: eb82615e1191ce27502eafee0578ed196b16336fcdc0d8a32e2b29ee97e841bc 00059250
- 01: c6b12c8ed00439df16aee7d84d3200101c1e907f242b968b40e17690f7cd4903 00072949
- 02: 7af82beb4cc9be93710b3b7853140cb30f0c1383ecf3cc874bcc0bfd7bf07770 00074291
- 03: 308371c89e9510145d764fce9569c094495fb6a71b5c0c526bb4d64d2b3bb831 00076425
- 04: 9d017cf7847d933633eaaa8f77506a633dd7fd4666b3bed359fb03f945215561 00076518
- 05: d60a1c6010e93e1c145210cb0209baa8a87116c93a1598e2f50c248dea674c12 00076665
- 06: afccecf4f8bcaea7c23295d6fe4254bf02e89b0983b8a4683f4140b2d418142a 00076679