# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
34ab6f9e64f281a43d91e7577f684c89f0c4be8b01dbeba3a5c054ad8a511133
Pseudo Output
0cfa6f11f00c0f6f8e87a02c35782bdc7dc67fe258f479821ec9b3f5f88add4f
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
a4ec81c4600988e7078acffd70cda1be5e850466b53df427a69416ca142ed02c
Commitment
f46f444ba3abe9bf1f68ef7245fb4bbde7087cc9bd9fbcfe6b47ce85bbfbfa10
Range Proof
672 bytes (Bulletproof)
Memo
e2ec9166bbd8302a6e8ce17e6bc0b686f62180fbdac40d653268234b0661cc1e0a69f19966fe25984937d16ee272a44f655858a707905624d5524e3485faa9bc8637ae5d90b8d2494ecbbf1dbf92755d3bc5cfc723aec4a859e4a05140949a82e2f61d40f29f803990bed014b4c67bbdedbb4359857e50c304f7beec2ef22ab2 (encrypted)
Stealth Address
fe962bc76800dbc29e84aaf63e9a90b3bc8b7a667c218fddefc2c69eeca3bf40
Commitment
66a844ce0223005b2a5cd5b9c4733bacc3127da7337f98ce7e5b24930e223a54
Range Proof
672 bytes (Bulletproof)
Memo
53d37a7737ed561161687fef2cd29bfb4106c514acc13a1e9c2df3f9c0a70ce1a4cd1f46a1e3b8d3cd50fc22271decd06f1295fc0d294ae7382ef5c400c522c348b1b186ee34916b70518cac22d66465bc59fa646ab2d09db91c152bcf5956e82022ad8790d7bda3e6723a2970dd5dcc03350b9ef4069cf6b66458ce47be2d08 (encrypted)
Stealth Address
1e5885fdb4c91ff38a221baac68ee13c1f0b7f70dc2810ec439c2f604d610b12
Commitment
1ec3e1ed5291c52809bfd58e3626d329665f4e2bedf02a273fd406d53d17df13
Range Proof
672 bytes (Bulletproof)
Memo
d76307265b469cfecf9b300c75c4bfc026c4109bb0259d2690da5338d7250d96860d00f0a508b0cc5b4eb818010395964358ad7f8470890e98e06bd327675668746a4c81e537f60c69cf0a5ee4a97e27812b9f3de39468d103959f64a1c77a2da4bb679debb5f40645b6d58a74ad3c70d26989658af970938063e0723879e637 (encrypted)