Transaction Details
Tx hash
f30b86d66da113b7124294400a8cc39b702f6f05b498b74a9b625b472165c3f0
Tx public key
6085fd99bc295d2aae297c7f170ae317f248417ef9dc65be11e4665f0e671079
Payment id (encrypted)
31b877e71c49d4c3
Age [y:d:h:m:s]
04:050:21:28:56
Timestamp [UCT] (epoch)
2020-05-10 09:07:28 (1589101648)
Block
434808 (1058077 confirmations)
Fee (per_kB)
0.000005380 (0.000002035)
Tx size
2.6436 kB
Tx version
2
RingCT type
5
Extra
016085fd99bc295d2aae297c7f170ae317f248417ef9dc65be11e4665f0e67107902090131b877e71c49d4c3
Outputs
2 output(s) for total of ? ARQ
stealth address amount amount idx
00: cc41953b5e6ea43cfb295763542d975155d959421e9819049bb014f904d0cd34 ? 1889232 of 4034615
01: d2df9076f44a79f8ca43568e14f04775018d63372a31378c329d4562b14f4991 ? 1889233 of 4034615

Check which outputs belong to given ARQ address/subaddress and viewkey
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side

Prove to someone that you have sent them ARQ in this transaction
Tx private key can be obtained using get_tx_key command in arqma-wallet-cli
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side

2 input(s) for total of ? ARQ
Key image 00: edc4c9cfa397764a775bbd2d829527fcb4101704ee9f27354fe9dfc214c12595 , Amount: ?
ring members blk
- 00: a2205499af83426527c89178e4347648bba54541eb5f229cb9f6bfa5756e0e02 00261873
- 01: 353fc1fc467379f18acad78f0fe4329f1a4a0bea826d729d5f1445c89f241fe7 00291598
- 02: 1f190b9206ea3fbff53ba0ff449262b5f36032917470d5adc23016f9dccdd8a5 00406074
- 03: 3e4c3307b2a9e56f5a9c4f9d9899030ea487fb88ee93ee0621e129728ba2f1bd 00434096
- 04: a877fe88f504381a39c816b2b2a04239538410ae87d3ad15b889e1764d399a65 00434288
- 05: 468530827deec77664ef2f76a893691dba6c406d2e84feeb554cd9a6b32fbe60 00434336
- 06: 11e5de7cff271d712ed4e8cac703fe92af1c634555f28ef69785677b8ebe65b0 00434546
- 07: 9ac2f112e568cb26145612fe80f7c95de2d4a3a41eaae70f3c1ceffb44c055eb 00434699
- 08: 555d024c566289b814f64baa0319220daafa8cd36fd20770b7a47d675e1a4bf3 00434754
- 09: 38af7cdd5bb22f8e112016b846c8b7510324db0a5744e10995d9aede9fd5ca79 00434764
- 10: d0be45e320b8abadd2cf6f07eef0f9a754dd78554e71159c3fc6d8ff26b8e590 00434770
Key image 01: dc49cccebcb8681c411fd11489133cf09db1684fd16418544e7623956873447e , Amount: ?
ring members blk
- 00: ae680aaa5a5c9f30203cfdc5317d6fb7f24df676ec4ff6e4331ab09890e3635e 00360309
- 01: 642feebc7df444c999ab9def30ac5e37d8964dbf0797724cc6ad0e6e0f016ca3 00361001
- 02: afe93b52cdc39789c0a2e285e2cba2fe087a7928503639999ebf04f299bc9fed 00414717
- 03: c6aafe32fd1106359a4a881732c05402edbfa3f3864d81e77e00327a91bd30a9 00430510
- 04: 0582ccde37d5b4c053cce8804e21212c4b92cef45c476cae4e7d6b053120864c 00431422
- 05: e22fb0df7b6c6da2e9c6119da79a013bf1dc683989798e77a68c4db50974ae76 00432513
- 06: b40945174a344a18204e27fed794edd1bf6cfcb0e44bbe6a1a01e2e4db47df6d 00434391
- 07: 0c79d6fd35a2514a98869ac6d54a2785ab50a43b9dc5dc020e8488b9b9c871ab 00434666
- 08: 130f482dc39b40070503b58054fefecba04f694b93420edf51af58d263970f7e 00434775
- 09: 5cde6c98065ddf8fd0cbef57ffc54be4ec95831bb4578f3e29a5d93ae4abe1e0 00434777
- 10: bcdba53de4b4dee6ae38410806cd97b0d5d6a68abdb4dc55c6e27373ee4b6c89 00434779