# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
20dda30d26c00c2445b284ee10ee0902c9801e13340dc9886621bf71b6b0e34a
Pseudo Output
18384bc61faf1a2235e4427b0eedb4ff522684eca516f0d1526f4136c27f4474
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
cc682a73a462d9ec63f981239eb435142087ddd530fb8b63f148985d9f7ea250
Commitment
a2f3414c1d369692fb9d7527280aed149e21db5894bb40c07547430571f69c3f
Range Proof
672 bytes (Bulletproof)
Memo
361672eff49ef394261d9695be6229972dd2d199b8ffb30ab3a035476c6a02119926226663371455fa7928c1fc01818168e1116e79324b1852ff5e724c2d53a8e7a6ab56f7f5cad61edf052a7f5a1444f9f5440ddcbbddaba90c97bd567a925e6f96a71eb32c911fe68a5cce137b6f8e7f0782ec0e6269fc88e7468d50a329c8 (encrypted)
Stealth Address
f85bd02b88dfb67e69d188ac8094f61968b8df43e998f3543304cdbe06b0007a
Commitment
605f13a5ed87d63659152649e231256fb1ba29270460e65cd7c5cda0ca4a4603
Range Proof
672 bytes (Bulletproof)
Memo
9b3e614228ef3968085112c6ce4a05131d9f289bb769e9df31e0fae8c69481c36900a6f0539869637024912c8e6ece22c5ef5ed54b9ab5e1bf19adc35698da4bab2531c14bd3a0c316374bc84c00af3ef81c87e8ba8cc9414c563bdb854a2c0b05b6b95deebc84d5853df20df46488b7acc982afba80c41e6031febf050ac3a1 (encrypted)
Stealth Address
481eb6af029c813d381436b15a8adc3ef2ddee5f95da6ec501d3d96e5d1a3806
Commitment
d8388210c0494b2e566d47542029a02437e37b9d8e603d60ff8dcd868a75b013
Range Proof
672 bytes (Bulletproof)
Memo
2f48aa5e3df97d2cceb07e935cea9453df23ab996970b1b89165972c5e354c77f709e3e3cc420d55c6cd0af7ccd413bb1b3ac6867134db08d9ccb8cfadbaedc81c0b2957ed82079fba612bcd8089834f2262392944b3ce8612f15e2ec19d32600d0365569b7b23097050dd4b9136b7370e3ef3b8c34136d8c6a9fc2b5157ea2a (encrypted)