# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
3cadd99b1b16e62cc7acc235f63072f469509816481eadda0eaebc07fab91a60
Pseudo Output
500aabcf5dea3166e87e983b97d9612178f5276f294d01ef0a7f7653d2d9ef65
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
38ddd69073950d331c97c764a56cda87f857e8e3e9f77a8681abdecb2d129469
Commitment
36787b7f19f0054563a88ab29161d6fb1cf38dc8cefc937f0410023264522704
Range Proof
672 bytes (Bulletproof)
Memo
fc1228124e652581b807f0bfecaf3f86fbed364406f51db195e745c5017579a65b383d2fa5acfed6c4fcd3ce0abc0181bb15b41705820b63139960d4a9fc5ca40d1ff8d28f90432c8a329b353eff800bd3c88322a4575bcd55bb9e04db4f52f220c2e6e79baed8f1c06c1ebbd7c90c086425b2b8e6bc5263c305ae3c9920cccd (encrypted)
Stealth Address
00514369f84e40eb4368f49cd28b61cca066d39fa08c5cd809c3955957fc1644
Commitment
6ee02b241e5922bbc0782908fa0ee67ed5c3c726099e4b601490d69ad5e3da0e
Range Proof
672 bytes (Bulletproof)
Memo
8e570f94073595b620e0df311de4f8b0c38747c7c2c3da05fc2621d4435153ef2ade78c617ec9224bb1a7055621ed6c8aa2189fb5ce887a42229a01a58f068b776a8069224e2e23530468d64a8bb06a240f40eb8734b379f67f6406cbe8f68fe8834099522350e8c0d506ecb073dfb6a6bd11d08b521f696c28106ae78fc7f67 (encrypted)
Stealth Address
729ec24061f12e696c304e55f5c855114551954fbcaee034dd5a4953149c4b3c
Commitment
36cf2629334b8e0db06cdf5e1c6bb38e0fdf9d390c5e2936d0a71353dc2e7d6f
Range Proof
672 bytes (Bulletproof)
Memo
776e4652efd246e6b8763337db0ad12c379bc66c92c6646b22c9a6b2e89c233c822f3330e608ac3bed9ac76c910d52998a495b7ba64c2e64d1d7f3c43ffe12489ae45ba217234f479a0622fadf184dbdd6d2d529ae714a313b3ad68f017f1d6f62f82494cbcc77e27fde931ce61fd1fbf1803dfcab3aac093d4a8bdd541a151d (encrypted)