# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
c2e166400894008ac0156833b5538bbfdd66cebbdb36baaeaab8f50e8c3ecf5b
Pseudo Output
140bca6dc1d1664b769326324e47568458108861aa20db155959cc5cccd36273
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
4cc3a4947fed007ef8f5464c7a0d30fa38319e7a42b2306dbf8b6cf9311a492e
Commitment
ec4b134a56e8a32709ce42ea7878e5b6e7dd39b12827a21bc81d187f05678469
Range Proof
672 bytes (Bulletproof)
Memo
34c24797a030adf6dae88e3d060806ffb205f21908596093141fc4bd696047645ac537e01280b6f5702b039b28aa1088484d4619f7e78235085cea8ad29cf2fcb16d4968f1fd8ed00f11cfdf899d5c685b2ea84979fa2d79ff7f1ccee279a1a8647078ff597ffa6b9bc13440d43a33ef11dc438a87c4423bf391f67ca7c420ae (encrypted)
Stealth Address
38564b5ad9f3bfb229baea7927e1d7f8d2bf5ffa1899995b3fb70f847bb40844
Commitment
46239648d470065d196c2c3659a54bf799d71f99a2475f88b6a1156e1d88460d
Range Proof
672 bytes (Bulletproof)
Memo
e34321a7bf37287cb806e6f969fa4b269b70e5913081fbae53a91e8da6f2d2e2e94b69edfeb4e4d1b4fcbe9ee38c3a81752dc32cb2d371004c5b3968a0e52ce491976e6baf603cbe81287ddd11c915184d34823cf34bb9188ae36f29c9572518aed7d9b3a100cde00f7c52e1081c2503e984e2d083c8f5d95eb0965bfab84e0d (encrypted)
Stealth Address
7490131f7d7dcef4ef9c1805526b49ae43e83c39eeeb463352ec50594cd02214
Commitment
ec4871d93219610f2eb6e406c158b83efe8880ffe291089be164b66037bc3161
Range Proof
672 bytes (Bulletproof)
Memo
54057504b3aceca5ccbad47381b28a90ae73a162f3c25afae9ff4659df338712772c26bc159abf856625d7a11c88a12b11cf8bbed33693bc9bf50b39b979fbaa5194248b7828fef388341cbb0c65b60244f2849837ad13b7d01b6291ab0eb3e0923cfe2a2a03c9200d2a2848cf004db941daa85005d5f2e721cb7cd005ea7527 (encrypted)