# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
b46d2821e23f8cda6f9d8dbe31e0321c1695b1c8c9d3c089d4468a4de3099044
Pseudo Output
5828f8e0a4cb6ed9fab4f8fd733370834aa4fd80b04408be2a3c04c3f931241b
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
e88350fa455e5b59f72474eb11d81a864c1630fb2b967333b0310b269c1ead57
Commitment
cc91f7ee315f24abed3f517212b3c67a00541df390266edbe264e4fd6f531266
Range Proof
672 bytes (Bulletproof)
Memo
406f8a5780137c5da57fc89f7160ae6e42f04912cff44b57528766cbf0e006bdf52fab15a14cd28404406e0f0c9703cb21efda8348b322afb4fa1a89a59be6f2edb3ffc8bce1827be3ebd3a8d5a9db8604116fff6880bfe98c51fba631ceee264bd47bdc3bc5af94c49d4897a3221f2e8b5f723b7ff0907feec0214f9a4b7fb4 (encrypted)
Stealth Address
36d2f4f80fd6006baaf6790c0865b2b8013c7069629d096b3c0a2cd5ff1b3f53
Commitment
5c8d01c40ab38a4d585464f0ca0b7d17800de0c579716124adeb827017aca20b
Range Proof
672 bytes (Bulletproof)
Memo
9cce59151bba02a2e82fb9e5c0d79d166407f7da6b80675f457a25772257b2bdf9284a4bd30c4be3554b5abcb2b713315131f648e0cdb4ccdaff998bc08ffe5dceccc8b7fc7db4f6b7c7f711f33d589de3124c3193fddbfd34ce5ca6e37a24584dd2a92480545e039f630fb49abc30b807b8f7c96824109f6fd7f32fe79ca23d (encrypted)
Stealth Address
986c52d227ffebbfa6d6e0470ddc4936f029057ce26d721a6a7c5402f7949917
Commitment
1a4fffd07131fc75b74c9b96570d0265805f572faf10d740ba125e26b53dfe59
Range Proof
672 bytes (Bulletproof)
Memo
f8ce73a7559c771ec3765b60c86a26d792830dae9e7f5d1864a7a3716bd8b18883dd6540152fe8de715b0713256984c5126bfb9a5aa9fbc6f0d3566148c7cca724c3854b91093151d89eacdf893fe0e80ef4172871ad0b3b6c1578256d09181cb8c4921e0739b057190db946afc345ae6b180f230f42a2c8c8d975f9edcf6804 (encrypted)