# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
3c9af9cb379a28324369ce7bb48ad58c691712fdfe12c813145867a070911450
Pseudo Output
1ec0d44e7c8b7e66381799e749b78c3c97827ecd9c407fedf68eae2ba6214725
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
4e4602652fcfcf970f232dbcf049c058f39124890fe7f207477577a0840f4e65
Commitment
086bfc7d92e3632e05a6c3ee54cb9a5170c2ead27f81898f90272063db0fe557
Range Proof
672 bytes (Bulletproof)
Memo
598ad82c88bc0f1abb9af16101bc08caf122afbed15c14430bbc2f9dad7aee1ecb3cf53d66f4b57115089e5eb564a56d4ef78d88e74be81ea6ae180a48c1a8c65379cd50825984619fb015ada9d78087f5c64bf602d8a3eff7cff6b7f0b5b5895275fe057f0dc2ed7093388836ab5420973c1dc4a421c6096e28510655984aab (encrypted)
Stealth Address
5c6b5bb250961d8b22c22cc9ae239645fea23ff7cc13493e19c032314e08160b
Commitment
3cc7053268e415cd21e5ce243d3397131b02a33cf60d44f1cc3cf88b424c5f2e
Range Proof
672 bytes (Bulletproof)
Memo
7e64dd206a66c628a1410ea14aad14a9038322e2f7aa28916775d9ea865e88aa75213b6f25f62eebd7e9a376d5d01e055bb381a125bfaa52fbac38b0c1671ae4e9555afb672dd8fdb04d7a76482c546f5a079bdc65be42b4fcc56a78192aab41620b456f725755e599715070b2eafbcb1421db9beebf4f86b5d6024c9e56bfb8 (encrypted)
Stealth Address
66df003d7cbb961aeab0b47b1db17993cba3953aaedfe595ec191145a8eaa118
Commitment
aa0a57c1632edad4f65b52e7327b9f557c97af9565b4f627cc72debdc7ab1427
Range Proof
672 bytes (Bulletproof)
Memo
0d0af6cc9022d63380873f4afcafe58775575c977ec8dd28ed9d152913c3e04cba346924dea6e4b26f7f42aa290a58694d7f693adcfa8082ab992a914c4f483d1721bbe8e48712825473828a9b26f91032b8cbbb645ff7c55e40f6fb9fa9d8bea1a0ef1bf00abc953802506d3238f023b015b44fa2d0d4f2e26d3365198e79c7 (encrypted)