Transaction Details
Tx hash
dda1f12cdb2beee0f52b85cb2966b5e6dd51e637a29201438847821634e336d4
Tx public key
9d7a8940e3b3a70183a728b9285b957d1cb8e51cc44b6dc37efc341d1b3e78b1
Payment id (encrypted)
0a612173f121aade
Age [y:d:h:m:s]
05:221:08:24:20
Timestamp [UCT] (epoch)
2019-02-24 13:18:12 (1551014292)
Block
119920 (1440026 confirmations)
Fee (per_kB)
0.000030640 (0.000009380)
Tx size
3.2666 kB
Tx version
2
RingCT type
4
Extra
019d7a8940e3b3a70183a728b9285b957d1cb8e51cc44b6dc37efc341d1b3e78b10209010a612173f121aade
Outputs
2 output(s) for total of ? ARQ
stealth address amount amount idx
00: 1bcfc69045d42e3d5b29d84f6b652896eaca441a5784438b43932ed84280215e ? 579415 of 4133607
01: e1d61c7e4c25b89630235cf78aca9bebc11bcd3027adb30e4e56e24f94569dcb ? 579416 of 4133607

Check which outputs belong to given ARQ address/subaddress and viewkey
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side

Prove to someone that you have sent them ARQ in this transaction
Tx private key can be obtained using get_tx_key command in arqma-wallet-cli
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side

3 input(s) for total of ? ARQ
Key image 00: cee1a78a873ba4300a0ff57e6a1bb80d92e8b05d1756159658f2a3f1fd2cf852 , Amount: ?
ring members blk
- 00: 73cbb8dad1e3b04c8515b95178d68bab00ebbd1a696cb4fccabbc3ca67eca4d0 00118022
- 01: e463e74c1625e3ccfd6d4f10426265fd93d906ef1b475130fba9c235f1460dc3 00119676
- 02: da920fd3d45225ddef45fc735c2fc4990fd03b75210232f2f26d986879ad2723 00119695
- 03: d55044824c8be99bafbb8f2dc2f858d25e1fae7b30c4f6947d52f53c1b80b936 00119707
- 04: 5caff656277dfb8f898538fa0cc064788dd956dd7030b48f8cdc12b705da3001 00119710
- 05: 73591397330262effd4a92804d95f180c46799ff67b1bce4c8e3348e687b55c0 00119715
- 06: d4b004cc5e07d432f682402743f1ae112d7496949a79b525095b21553aeac71a 00119789
Key image 01: 72a1b04539359f846f60e0fbbfa7086c6758bf86afd184c2e654501896dc8587 , Amount: ?
ring members blk
- 00: c312119c26fc05e631faabdd2d78c8d695b8c77a2cb36698602db2e78787f531 00071353
- 01: 25d6a636e205452e6c7c40181515b5e73e7761b89a5cfedbf9c5f525224939d9 00114242
- 02: 55bdfc91710e1dac530956696f989a380e2742b46a154feeedd81718a5f8a6fb 00118608
- 03: 14384cd756d566a9882947dc8175089ce47605ec4bbcff74eb3a4333d73635a4 00119733
- 04: 30428f2afd399326d3f07a5861f55e171b58b0ef5c8270f70ac1533f0197686a 00119823
- 05: 5fcae28ee4592f254a7ffdbf15e3d620c052f0a31341057ff49cdf5f879eaf35 00119892
- 06: c9338fc238cee1c1bbbc268e697c5bc1dff02f0d021578335bb75d83a85de171 00119908
Key image 02: 3acfeb68b025283eb53a3027b9d4ee1ee6c64e51c3d0e4b6db95567d9bef50bc , Amount: ?
ring members blk
- 00: cab05ebbe3e9eeb02702f5c16c1ed600c25502b5540b6670daa50d8977b6579c 00030154
- 01: a16fcc582bbae2e75c4c9108873e6055367fc45b25447674b08eb3503534440a 00117593
- 02: f01e980fc74bc9c244d7d778b2808633bde3c85f498585bab8e1528672c174fa 00117756
- 03: b95a471466aa1b40667c6199f4a30691e9f2914ddd3acd69dd2c4e5637075878 00117956
- 04: 6c36561e2163d618d001b73153404276d734a6649edc02d8bc5aeac50b4d4da9 00119475
- 05: d6c0b206106411c941973f045046d44b962dbc70256eeee855dbc734e07e3b55 00119727
- 06: 06a94cec895c6e629fd147d04dd0e050e62d016afe730017755cfe6aadd2882c 00119786