# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
86cc452e457b60a5637851ec94556abfc8191ac3d8716c684473fefaede8a31f
Pseudo Output
18b38f0d4bb115e5c00a999e6e8ae788280ce77a4aa3af22c886c8aca474c972
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
9eef3c2dd3e5e7300d17441326608950626493aad63889a44ac412ebd24d615a
Commitment
4c4243b0c18fa523975f283d7156dd394110ed100593e3ef59f5cbd0c5d56b02
Range Proof
672 bytes (Bulletproof)
Memo
db84b298bdae9b9ee6d18be3b18aa8387f67444bcae34ed7444620c792f9efe8c0ed934261734f22531b2fb5f410e7e00eaff01af42fa68cbedcee5a44749eaf05aa912e1388a55bcbbe0420e36813aeaf980c24bfe8dcb0153975fc73a60a8b728a1a7115ac7cc902defbfb84dcac67e8d63babf0ad367a688e0609a058bcf6 (encrypted)
Stealth Address
c4ca95ec7c34f87837b56353bfb18caa84dc9a9aeda21a12dc6c6e48633a6614
Commitment
5efab04b9633ef6061b793081c9d3dba159d3cc07b7decee998d9a34fe93b631
Range Proof
672 bytes (Bulletproof)
Memo
b8419120a8b76b0f0246c9ca3bd7871668e6d5fc9d7595df282c97dcaa4b05e8eb7008c61de3607399124024be2e18af686c6af83ff368a7ace61cf118dcdfa602164ef0b7521739f5a9092f99fd0e7f3167e0c2084af863f452292568ff5f66f96d947f4ac2542990566afc6ff8f668c0130ec2a5e92b4114877dd6d5720e38 (encrypted)
Stealth Address
aa9a6d0aeba1b580bd685fc59262fae59c3052712cedad3945b9879ee340a656
Commitment
a21d7ac598401e249f8ada85272c340880a6a5585693f30869d52c2667c08f6a
Range Proof
672 bytes (Bulletproof)
Memo
b389f3f19bedee43467717e9cff02da3eefa09c43a19058f89b29796bf8bb1dbcbcb870dc7655b577599015c9a35424de9c8bb2a58213d89b2b2cd11bc9cbc44b8cd741274d6a384f9981e169ee96cfcb44695a084b99960f5a11127d38ff2ebc63eec73519aaa2771b883b600411c2a7ea45e26f4d0166e541d44add69faf65 (encrypted)