# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
e2ebe2118b5ad7fdb4d92c3623c8df426f1040c924d39c9c9c48095a6f98d745
Pseudo Output
fec48ad77a2a63ab046483b5c0a2c205d415f7f63e6fc44c2e18b6f29dd0066e
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
fcbcb10c72343c2a1f8fbf3e8b07b4232d24ee46f0913e5efd243652c1948001
Commitment
9aca2965d97b890269f74712d02dc9bb4a8884547144723c1063df474c424931
Range Proof
672 bytes (Bulletproof)
Memo
227681b8dd827d3ee58e13fad525d0125e60744686d2f9b0d80636557a0af9f47944a22f43a6ff4ba2b8536ba0c2fb2fe54a6aad857ef99473a1f121cc9da220d5c9a6b4c062e116da15125ffc2e5f1aaa583d0ac92aad68a28940d51778067caa697f7a24c8a294b4fbf26c9dc6633ff721bf0d604724413c0b2e84db278d0e (encrypted)
Stealth Address
b241e4a123e1f4c4cd360cb3165fcb931fc3908c4ca8c447f828ac44c2c14b10
Commitment
76ee97eb55d33b3e9f88026f2347b1a0f1de84fa044544213780512a7265830c
Range Proof
672 bytes (Bulletproof)
Memo
13c69e73fd18ec7c698e917faf90795e453bb2defef2e161363dc1f5e69b23dcb39cf8259bb9e51150755657c7a15b2a7bda943adc512b561167819bbec08bfa68c3987806940ef5cf6e3ddb9a6aaec86c288035c4f005fc8e853bcf14731badfe28e5c8ef794eb89994928726418c8e50bc8f07f1da259fb3b11a620ff2e67a (encrypted)
Stealth Address
c8fdcc01192ddcbc1906ccc484efa0670989cf358740723e59ea1a2deb384e72
Commitment
7a07929ed48bdef724eb47eec9e8d91b1026d13268249529c4c6112b3267361a
Range Proof
672 bytes (Bulletproof)
Memo
6c5b74c1829c93de18c1253a601e55454854b43a834b33973acfc6379d67ce7e715c372fee1f30bcf6867c357ab50468380ce72ad47f55d68fb4e99a19a005569276dc5ee27a7017265ee82bea47a29ce3c80d5b42705d15278a7a596b24952a5cd7f116ecde50426da822ebef6b440100001b2f1f6a8b400bc0d3b5abfd8590 (encrypted)