# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
c49e1668580893d59a4fb0b435d753c9a40b3775574dc42cf25a503cd2798102
Pseudo Output
4604198dcd1962b8b999cd827904f69052d711f76661e4985a35759234da6566
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
fc75a7362b274c33ad992840194ac343685cff16c229a89c96b41cc4eadb1d3e
Commitment
487c6c9dca4e178d18d482f70580fa867c1a56d1b94f43ab8ee3ae40667aa806
Range Proof
672 bytes (Bulletproof)
Memo
abeeb064c1f2b6c19e296b86d022078cd67d6a2870e2a59f0ead4f1edf9ff9555a7a3b893ef85381d098e6af7d28c51e1d662214dcc9e24ffc6974c086bb20cdaf8ea8ce04414553559be54bfdf4e7dd3583b318860262e88232ad8ae387385e4f730c38856816d929b98efa6185d66e729644bdd96a5690df65bf0c734b1bb4 (encrypted)
Stealth Address
6cb77847b24b54f4dcf5a9405668fd430ad4e22a6b03b5b982b3ec37068baf62
Commitment
c282f7a78aa9dc37309f13a5f1e0c64b63704c1a10648c068c107c089b131d0f
Range Proof
672 bytes (Bulletproof)
Memo
236f0fb5d3290030dc925ac263535c90bd787ef93391311298f528e53322fb190dc62ed605f920af4387504322e9a3d4711f2efb38da2cc97189e7adf338649edcdeaccb07447d685e61ed37f6a6c1d1c4f8754c5d3147a7a79e4b682d895925dc596dc8d937e8228f1f91fb8342f8feb83d999927ebc951606a1150b5d64510 (encrypted)
Stealth Address
d8f524a34ee60481a8b5b7ee60ed37af6cf692fce1a99904845c0819d3c78e39
Commitment
ec44a4c02b0784a54db91adc8a811e8b486d6daa893785f301bf4f5c2f0ad01a
Range Proof
672 bytes (Bulletproof)
Memo
fc15237ac0372321dbb6401125cd82d5ef5a16fcfe61c2f2cb9ddd2583faa7530971a2d17fdf70df3f6c103e51432f70b193f3f26242f44162b7042f31a2635ccccda363918fae6997447c3f7e77c9d58ee9b68dc6ecae95cd1a9c16bdc7a255748b8c6f684a2bce91f1df65d76563a0569086ceb0ee2832fe206646ca84d659 (encrypted)