# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
ecab418318081c77e81f227fbbe47dbf89408086a2b6e34f88244ff2074a670d
Pseudo Output
a631c9e16b4a7bf5c8bf553098b198664d58ca4a3b23c7db5b879f03d1b3cb53
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
c438b65874713e45af864b6e11b02c0e818bcb778081c6f1434ebb5deab04345
Commitment
6e44e7a8cee5188e979ea46e57621e61ce96bd777dea3843837cffa525c52112
Range Proof
672 bytes (Bulletproof)
Memo
03eaea1c5dfd5fea37065f0942a134e01b26fad5f30bd5d498b30a4c50dd0d68254b43f6cf587fe0782442f0ed75bd2c238ace42adc1c0891817d5b6fc2d2c2694d25fa9705fa1472e4107006174965fa6e01650e8f926f52746413af95c729a7ea62964cf168cd1f83471b3ed3804b1218206907d193cc9feb522214fc896b2 (encrypted)
Stealth Address
3e4b193f6daf6ee29dcc09e151a4282ecd83e0b353a4c7d004e8f44bf254e56e
Commitment
cc881d6027390415b5ba583b6f3b5f1113d1090d0d7ac55679f50f28a06e177b
Range Proof
672 bytes (Bulletproof)
Memo
46fc93dab7f5bae3b4c52ae668245284a1eb715282b3dda90e9c2787c4f84e17194b9d2d13d4df0c271cc2ce6316a8fc1be884f0992e186aff8774f020f29b73b8b3e4f95eff381067d99f77992184e880862fd719a9edfdb036c436152d8a30926cbf03e20eb262886c495d91d2bfab3c014e6cb4105fe626d8149b259e98a1 (encrypted)
Stealth Address
083fb4c2206e2c3fa1d0d71bc4009a26c51189e07b7ba00e120fa10726cb8e00
Commitment
1ec2df20443ed87744fcfba9f5015666931d41b622b2f37c102583b3f93e8360
Range Proof
672 bytes (Bulletproof)
Memo
fb20a6dd86047c12d396a9afefb373ac6f1a3ec07781530fcaefc30870117653d1e5650b1753854bd26ec49b6c1f6b34c0cbf888e665eb9a5ef0a0d48b6d494a63b752b10d91c588175263b8f52454040b0a84a2ba98751d21aceede3ef264a70889c00068ab75a64111e2a4f86ce2bfee54fe768092fa88236062f64e5d50eb (encrypted)