# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
74472e1308304c8d815c62ca0e3e514eb2615e6a730d8a18bcbb65afcfc6ab50
Pseudo Output
ca64b538072bc884e2e4e7a9144915504e7e998b0eb2113e56baeec759115d60
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
e47c3bd8ea51bc85183ab16d885e4d5feedd10bbabf19f53467416efc287d74e
Commitment
fe4cde4464d9b4c3726e74a05b744b1914afe200c06e1f7260e99b7713b4b203
Range Proof
672 bytes (Bulletproof)
Memo
6342adbac6896247543124dfa9fc385ec806606a08550271c3c5c3d6de470ed971b6d4204285a2a83fa127cfb83d6c0a10d9ee8e6824ec735ae4e32c510b5d5acaf1e0403845c4930f120fb1dac60a73f5caa03f544457c7037bbaef23bbc3299b8f00b6a7c63d9b850d1aef8762a83c39339b7048b77920d7f848ed58c87e9b (encrypted)
Stealth Address
88dea16e3eb88fbd0a4f92616e2f94dd26326e4a1ef022c1b74c0a05247a1924
Commitment
3e76a1471efb4337e4fe8fb3ec447cd9cb91413396f6b5dc7e1e7c31925ab97f
Range Proof
672 bytes (Bulletproof)
Memo
ff6c72f4e6ab0c4bec769dcdda8a49ffa5b27693a3e18385e948b69b842b1bb24b28593ba006ca72c479ba880d6bbc463d6cd12e9265d78aed8d1d1216a482ec9f514c8ab98812a5bc223589305de3defb2f59262470805809a11491cf750439f07fb2f12af47ce9d3f1e3c0d043935840527a27cd9f3529b9dc5d8ee24dd91b (encrypted)
Stealth Address
ac597b08261afd50473fd2f331961a6cb79ae322c217bef30847e2a308f80261
Commitment
b6f242f72bcb53917e7e709c02869927be8935b2987136811a0f2f6830c0cd7e
Range Proof
672 bytes (Bulletproof)
Memo
e0ba5e1e5fbbac7b15448b96fd90d48bf69314bf29e03169aed1f49bd1fc4e03f47050708b94720f5a43865992c59706e9c9b836965875550f4cc1409e990f5da07e4ec13ff97c7fa27c6fa2f370265c0c0238e91409f7251691076e355cfbda98f081c5cdb06d7ff43b0700ec1aed53e6f598c7882581d8ef581e2123c226b8 (encrypted)