# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
02e9c43b962e7a6656744bf584afb302da92cecbe64f670bfe5723ef24912c6a
Pseudo Output
800eddc291d55adf1f61f0d392fd1c9ebf2e7abf74a26a409f3362e930696662
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
c4f6fce5e9a243298b7508ee855b290323ee7772ec82a403985ed0b3862d035e
Commitment
e85c10ad08c49078e5805bf24bd2a544863367b1b807108971c6c633355b8e4e
Range Proof
672 bytes (Bulletproof)
Memo
2a2e5a64b451a53b65a28f13c909806265443edb31cd1130555a405e410d0502715885c6d46e9922ea4521aad5a027b48eb65efa52a46b583062097c7f42d50d515a0d6e8330ba065dc6913eb0c066c1ff70ff86d3a93f65f6ef714386a701beafa51193037c79bd628403fb99159baf337ea639cd75c1e9de7b0e5402608aa6 (encrypted)
Stealth Address
24ffd16fa9309c6bec570a2f9f6636d883b06c834628ede1a867a74a5fd05f12
Commitment
dc38c01c955b810ae74372d7a2a0b7e8d5b723fd7dd1dcb2d3b252100ead5914
Range Proof
672 bytes (Bulletproof)
Memo
4e4e347259692fdc71d36664d75c793a9c620e3ae15b2b3eba9c5829df0586b129816afb222ba5153448bd09de281af9f6cf917366d7de52eed7169ea6eac95efcd66f3e4250d1a3e07353b8f57daf91564e63513e33cc3acdeb5d810a33c8219f3a2f09d705ed653355a99166dc875818455fdae9ae2fe73b1a7c83037f1979 (encrypted)
Stealth Address
f02ae9a33ee22b6eccc3e3117acafdc69b1c6232f6e8f4de32ca8a894952eb16
Commitment
38e33ed5d31a6a7007d4b88c48eb2d5f9368cdcfb0ea4290ae5b7bcf558df535
Range Proof
672 bytes (Bulletproof)
Memo
f0c3dea0ffac24567de28408ba1c52189bfc7ffc2d4929f43ec3b3a2b467ad229b6cd81a70ee3353b78e075bb026ae758943a562af9dfb46c34693c933c832c10546fc28ee2c04be4c159d23b328af2db83b61f31ce12c8b9626b0fe8131ba47ca2218b15faadb95db044865a4f83eceac41667b4f205fd6af1bb625784a65cc (encrypted)