# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
1ad6c71336c1de132384d9d05dbb09123262bfe5b371600c7d2a500d254ac606
Pseudo Output
86d2b2dfe5289f023c31fb68b7c8f49fba7beb37c86ff9ab909f6113f6f88402
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
3c3842f3b75c4eeadc04c837ce9134673a88eef788d9f98773c8796b67681b40
Commitment
84af4e8c472889bb95ebdf81f8ebd3887bd1517facd49d3b1d6039a39b967b54
Range Proof
672 bytes (Bulletproof)
Memo
f59b10cd4b8c8b19a7bf04c589f590dfb25f739003483c871b2b7833668e60e5c07ef98533be7bf23e67a333267904fb4d9c02d9d813c9801781a8283d74414c3f2598237accfc290c3b98ce47d3e51ffa49500dc9c002ad481b155ed6125fec5e5d309fb0e01e5d1fd5eb121989b2e7bb3ac7cb8ceb13f6c3c5f953b58417b9 (encrypted)
Stealth Address
be08dc91d10476ce6bec8e5f26cd16b9bd0a95eec372b9d0924d30d239716958
Commitment
181c335fc649bea7a9a32bedf9b9f7eb6a10877ad028230aa3f9dfbeb2830872
Range Proof
672 bytes (Bulletproof)
Memo
1ce38380d84291fc3ce3798b053ec9f609d6fcfce1136a86fb9dc4ce17cf2e6070a14c4216516b79afd31b3618c69ce200c79afa51c89647d167eaafbfc30cb99e377f0af9adc62b7d113b9ef80271c54582f749006061978134b3675f921c591ba386b4511ff2d06d115e6daaa9b092a65b2068076c223e3c32309c7c764474 (encrypted)
Stealth Address
fa303ffec1a927a7b4457cfcc497b074e194183245571b61baa9f665b2d1161d
Commitment
9831c1d219bcb0cb42c048624c16d9486540adaeebc0fc7201c20cf118b12904
Range Proof
672 bytes (Bulletproof)
Memo
8447dc0b7a8c9ba24bb2ff9667030402b89213b9651d14f84c9f003e67d10a3a68286615d822d6802f550e55c80036ac7fffa9abba237b5c53933f79d69df6ecacbf422185faa6b58542f43f84ada469971598535b081eefb3a576f035a930425cf188d22f4e63e9412b90a4840d722b24804ef18f80d4ea8be5ce89801766f3 (encrypted)