# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
3098ca6017655db917d9e500628224ef7ade4c21bb17bdf4a02a215685572652
Pseudo Output
ccc5b15d61ea36417f4aee361eafd268726f22f2d307a157410bc158c0064b71
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
c4ecbc13073f6d1b9e4128cecddb192b3ba820c28c0726e991d819de08f5e15f
Commitment
aea835a6a9c33b94aa9197ca84b2837abb165771fc5fdf3c5fe1dc3199cab138
Range Proof
672 bytes (Bulletproof)
Memo
92bca8afebefc63b62932c4278987fafe3ebbdcd0dbf6383b7356fee3229b9ef2286b028bb250d3f2bb014ba428dff4e8ab5116e6e626b7b21f1fb85f7a368e238c5d66aae042587cd792c67b4ba4ca1c481c2a17a6d2e1df9717a534a4f525ed69a9dd6ad8737ae48481843b1c8b50ca3cacce93e317bab9a2e7e5d00ecb114 (encrypted)
Stealth Address
2445d3b9119ec3d2c40a24df0d7c72823d0c53fca22a5ab683fa3ac5707f6e11
Commitment
a8c0fcb3fca8f632dbf46e76a109eff3e7d6fe86c06827fbf57b2cdf5075915f
Range Proof
672 bytes (Bulletproof)
Memo
3cc242d586be4710a3b884afcf18f5cd2e0e0a72d15a9f22cf9505e00dadbb539983a4284b2196bf5d27dacd3fe6b0f09530032839d5ff218ffcef49b9c0b464c049c9691f493a139adfd8229b7fd43ac72018d02bb5d88e77794516001489a43d9aeb90e83105c6d264e5ee013f8f1e3942fa70b68946f2cecc24f3c3c65c9e (encrypted)
Stealth Address
f81aecafaac016ac113cf592ab7266deed37d938378fb5a445148f348818f266
Commitment
12de04472bbefcce52b0263fd7501c13e63f6eeba6f03b61df028a2ce7c44534
Range Proof
672 bytes (Bulletproof)
Memo
63567a80a6408d69985233a34b7bb98cdf38307ac042d56f70a147a54e2c60d8c912122acb7b18ce37fc3f5fd3d67e963924cb3ee3163731468565ce680a4f23e7873fe5fe972a66bd6a6d3b874a44db80d340e38cd6559ffc9b718b1607c6067e0690918e1aee662faaf6bfbab3aa3bb179a6e5a05ba1685f3dfe26da297093 (encrypted)