# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
0e0e9b26f4d7d468e87b3339d2696573bc6a5624cbb8a5588806b097d0f4e02c
Pseudo Output
62d493e50952d922c546e92936af3db571c019f9abb7da229e8ef385d300f005
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
4c3630adfd98a5c6fa5eb3685619ab38b35de5580a9ca3ddc20c5a26b3bb5f25
Commitment
c2b3d521bcd074a3ecb7541e07d4e37fa16683129192a0a3a8b37fb6a426d116
Range Proof
672 bytes (Bulletproof)
Memo
dd25a994a516e0472bb5af01c8be345d3479be493574ccceda315182f2b2263b66f3f2f3be553177a6328be5c598a168bff1a4edf570b09ede33c08479d53e023eea095a6a930a097c0754a180ca516d3a3bc4278e58ca17d022343ab130a0741e715234830f985c9017d9de97f78e8301fd642b6cf692ff15bd1bb4913cc07c (encrypted)
Stealth Address
d8e38fb9e18ae1aa27884a779bf6dae5cb47a218fd5a8dd7f4919eccc57cd647
Commitment
0699360626bb969e032478263cb7abb20c5b3900c2add59b36aee0249ce76d38
Range Proof
672 bytes (Bulletproof)
Memo
320824cfc9591dad7a4987adff7055241f2c541ab2bb77838e1a8d9bff7f47d06467a5b52bef5467586c24926187edfa1f34979ddee1216ce034b683daba60bb2a0b91244db82457321270c9ef862884d76ec690a36e8277bbd66e7d23ea6a94eefe6b7f00fe15d0fc328462ddc8d98969eff931edde147a0edd783ca4194d8c (encrypted)
Stealth Address
f48db759781dc068d7c3d32d3b5650b535dcfd9c41d626173f6ae478b44dec3c
Commitment
b299aac2daa27debff85bfaac0a1a2c3f1f860095be49a0133dfb612d9bea71d
Range Proof
672 bytes (Bulletproof)
Memo
c864e6338a3a4fc0af26d6b2e9263d8ea42ee97183b92a96a4d49f4a1172624fdd0f71f906631526e77dfb428e5a86fe28c408043f628895979647edf9234c8de2d5cacd8d70ff65a268ab1ad4014721d45060339e59a65efa36c9c7888b5124cd1d3cca76bb19e2225aaa90b075af5c7d6f87262b63e4ebd16639d603ef86a4 (encrypted)