# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
3a949dd78b8393e0cf48f94f64db20a6aa487a49fee7d157bf8e9f14c3ef4b77
Pseudo Output
bc2c4975369474b8c828f76e4215821624e9cf8cc775db140d5a733637e07d02
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
4c9e0206c80698713a5ef58f660f19bd087d81961431d9c97ccb18257eec701e
Commitment
1c5e4250af4e8b0fe1e3a97492d47bf58847b4dcc4ada9dfd37527c544201e52
Range Proof
672 bytes (Bulletproof)
Memo
844d9ce7ee56dce4956d6d57c9351cc859963b5cd5a364c984402215a4f12cddc1987c8a12e72dd154ceeb701f5d3d4be981f4efbd469d5d611f10d5d35361909c153fe27b527ddd0fda4765cbb7a9a32d31746c4ee86392f99780f77c90b3d2746af3207aa4af796ef741ec7704f95c8bde0f45a46b473079ea6f0a2d7e0c82 (encrypted)
Stealth Address
142031baede7305e3ba55f93b5972ab00051462b35832ac05a71384d09ad0a36
Commitment
8a387eb9c97b8b4383f9df20656e47216c342cb1bebefb3ba55e08ecffcbae16
Range Proof
672 bytes (Bulletproof)
Memo
7a8a5876e7396818176940e349178136692ad3ee7244fd54213939b5f1eb5f57fba7469cf50137f88905bf7d1f980f6c22b2288d5a6d0820a44a188409a44d53cdc2b1055099259bfac0be97ac90d50129a61c2c670d6b88eb0b0ec4c5802f8237f0d6e9af6c3afbcb2f5e48977bcf0822666aeab61121eecc5bebea81e2233e (encrypted)
Stealth Address
0c487b74edb069da7939a4582f662ff5c053ef3f7c7ff4243ba1bb0d525b7811
Commitment
8a60816a4ee81a6ef947bc3d0b51b24ccc53703a286dcddfa5a54bf6fb6e892d
Range Proof
672 bytes (Bulletproof)
Memo
a1311909d713d396d585f702c6f6e3d1f4d5aea21410bb12a049b116519391cd95f175698920849ca86003e40e1d932d524d067e692f0fb24500b9ffef2c3e95ca20a59a69ae87bafa155d7754dec3f567c10bcbe4a87532c1c87712760bac08c1daf758a0efe237c81f6f771b1265c073d6175bc9d5e4de562fc0db88d0d11b (encrypted)