# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
2c58ead822282b879d2ee881a8d22417033eecd4f89635f29d5a71ce0b53ca7c
Pseudo Output
682b0d3657d325ddcc2cf48a7aabacd5b09b7cab9adfca40983be6c3f9c3ed77
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
7e8fc8a7701752af8039fca85e9862a34544a4ebc28174d46e12d585f7fed96d
Commitment
18c850bf9cade2aff54738dbf27c414b53a137cf13391799f764465a9af8e24a
Range Proof
672 bytes (Bulletproof)
Memo
4a74106c80fc7a83f05923405de20194a8e8f07590d77b074d44f91d284000cc47a5766e20dab524c8f2e22c5c8b0145c0b06be71735d538c1572e76ae0493bac46fa31b0d52fb33286af744cb8f060c6af0865a3bef345039c9281d7d0b586a5d87ec945ce3e6a6573d05d5cea7b669bb2311f3cc5fa3f011da9aad0512ca72 (encrypted)
Stealth Address
32720d626b650787a37f09d5cde9c1d2e5a1798e53f7e1608aac49f202020a5f
Commitment
5c5b3d06e05b788946bff5795f06c47585476fd9543d26e967979f0126d06650
Range Proof
672 bytes (Bulletproof)
Memo
aaa21e17c43e56ea9d87ff88c844aacbf00c3b54ec34a2e81d279b011bb1d578f227a3b573b89922dfc03c05d6a84ae1b9fbf7e686b15a36b80147578defede6fd008ac53b0b50b2c989d2d88fd23bfd4c3ddd106ecf38fd60334f9e05f04c39700959b66f3dbba266f974249a88f73a3454218f796f4f1710debbf2c6857334 (encrypted)
Stealth Address
cc69bc0fe14140e0f78dd8d64fdb84538561278ae9b2f9b73aa997e7a1b9452c
Commitment
94e1fb328c70546cd7ca3d01a85cf4ddd5078137e57b59874154e2283ea63807
Range Proof
672 bytes (Bulletproof)
Memo
82e44b20bace3a34bb758d471677b209bfc6f2f4ca94a4b9870a7a7b018c732d1ee9248fd13e89ab9d46c87f6828b3db7938ad1e020b5f91dbed35e28153738b63fcaf5aee2a9ddb990e8474c7a8ff504815bc2cc44cb35e4143dda077522d4375c54d08bfb99cb3cf03707aa4a14f1ad9a122ecbf3e7d46ee0a63cf4bee75d4 (encrypted)