# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
ac3c2189313453fbaa488b9f6b4d3f967efdaa26027f0f7e492fd8c4b6948805
Pseudo Output
98dde311eff29864a46051acef0b4a7e8e8fff5c82d41992b32c925bfe2f393d
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
e267808629de41876ee2c31e04f33e786c00aeaf6fe09c719a2506aaedc02b12
Commitment
801ceaef81c64b024c89648cf4ea9022a168c6d2b61a9deea382259fc842c208
Range Proof
672 bytes (Bulletproof)
Memo
c221e5f5ed6e7c6181f6fab1aafaaeb50f07a6e28cb052b3f6923379028b2c6a186eff69ec24c6452736285ca9070ffa8293dcffc576ec1a3b4ab50f5008ccf96ec62c589eed6fd44ec0ca7acf23a0d7c5ce2886466b0a455b3f744f83e8d91d835d38a4f52fb986e313ca5193124a90948e612aa1aec2b9ac05aadf61f07f21 (encrypted)
Stealth Address
404cb14ef559f2a0773ae4f6d9cd46103cd5d1e4cdf274c17ee144bfb0d7d166
Commitment
c21fa7ca8a848c44a5146520f2e6498f61dd70dd03fbff8800029d9e85ecd20d
Range Proof
672 bytes (Bulletproof)
Memo
3822e320fd6ef435bc3d128d0e3a7d705c87070e6571093b373190ed4a24c91c22e9fe553bd624382891bd646bb2d77f1ea6f88551b724374eaf0d4b61e26990e5a567d815a0ab5f7bc18f23a8f45571478029536d0b702ec34cb3b887dfca598cb8381e88f86d2bd8bf2306928db7ea361930dcc129bc02ea985fbf441faf73 (encrypted)
Stealth Address
20271e89d6c66c16b769eb07d557d1cdf04397e7cec671dee777ab43b4d5c46f
Commitment
eeb417e08468934914f5454d603ce14534673360f9b2f4696a76047b9b74a971
Range Proof
672 bytes (Bulletproof)
Memo
08b8c3a6c3e4d3d27338e5c48b6caaa00d5a6baa75d8883967a8468e935fb14114d238273ab22904442aac8c1273b54e9b036237056128a7cd4fcc5f6db2b78be191d4e5d25fe32bffc7aa9abb5131eb85a6d3679590d48154cde877ee715bcd0a4459b9d43fd6be9d698860aeb5b93e460f9c6b6d2869cf6a06e3a73257e29d (encrypted)