# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
ceb44e9cfa94b120da997ae32946e6197af154d93f50dec9bb71aa2840535134
Pseudo Output
3e807d320149f102e4af6aebba9cc159afcef091ddf0760f32edadfb66dc3356
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
5c345ec82edd1360a0a27fa4cfdaf29e59eadcce5ab3c6829412695038802756
Commitment
c0155aafd95b059eec28a0ac2a2901d6b2457fd60c32d0e51c709a5d59d6b564
Range Proof
672 bytes (Bulletproof)
Memo
7060cc7ef437a39d5f0539b7dbeb99441eac241fb39a0350d5e8e330ae7653853d71b610833b39eb5185516e5ee9b2955977c7303ae7130e5d79436b5b3cbb28d60f500b0cde480038983ac98e256c46ed01736b5a7f08dc1835e4468cb5d7bd28560e6f870af2c11a2ae03d84ca0d2d1f65a8164082f00e7c6adf93ef900f0c (encrypted)
Stealth Address
643deedb6ad8c5874fd2531e606902f9aa59f309ff49829b5e95c1936faa3914
Commitment
981381768f36294f78b1f010a8e06c75839fbe8aab59ebb008d90b0a63f7d57a
Range Proof
672 bytes (Bulletproof)
Memo
a65547c9a480e564467035262540e1838055b8acfd7fa2a098d89fcbf19da5ae390ecf64f75fda9b170569ad37d68445a5a577d8f454bd2527166fa43d4f5e6fdb778ac1e589b81c1ed09ca05399b8a9d92329bdfb978263cdd9f27dc3fccd2655e806e601b1a292edf62804ca8cb0c559164d2fd4e4eeb1dc8e506ec00c9e2a (encrypted)
Stealth Address
d824db4b6df8c7f1b8b2eed9c596f494fb5d602f911c1ad0784331640b2be919
Commitment
5c57db5f10d8423e2753a484adc83dcd2a29f6c217dbe22976dea8d866419e5b
Range Proof
672 bytes (Bulletproof)
Memo
2f38015bb9a9c48b918876f55c436bb86adb42b454be4cdc1a6fe69aec7ad5f6d3aececd0da13806cc0777396bf294440020039b115e85e8897f410f71ed42c803c03fb6113dd2f92f0e7cac1b5025b6e0468b1c77dc98f2eeeb73dec1d63f4566063cb1010b363c254045f4432fd76c671eace4ec609e303582362ef70dfda3 (encrypted)