# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
46999f6af3395e0ccf37da7b75d58508af06d99fdb62b85d401aa812c3752840
Pseudo Output
a89b5d4c2a92c0439df5d37edb8af6e3c6e1a4579f55fdd3767afe11f9b3861b
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
44d55039ecd51c090e84f93c97b06e8a62c55d239dfd44dacf5225cd53fc4b12
Commitment
de68d6fe2045936e0d63776d8c4feece9730d1f863a1d0117b725294ea854228
Range Proof
672 bytes (Bulletproof)
Memo
34258e658334aa686b2e3e681cc9090bff99a60f44e4ea4dfe62fd5155759c819649a154a8613fe1df40cc7007f7ec892317c3c4d878346badbb6a27e8abf4dbb9c6ea5a63c24cd1d7df53ff8aa1eb1ebd8c4100702aa5e4e97890196a35b1fb088378e87be52877b49bbe0b4828cdec7a94511da492bed0f9664b1532960e0b (encrypted)
Stealth Address
9231f3836d722488db2388ff46ddbc8b31c17bbd397a1f5b483c17bc367e6444
Commitment
0c4b59b828fa7d6808abed1b64a3ac2c62752a1785d8e4fcfa868d73f8e3343d
Range Proof
672 bytes (Bulletproof)
Memo
57933b8532409c98bff7d10a3f1c49289260f8d084074827ed63d2ea3b1c9e352b70021d79be31ac73e5718fc0f9eb0d5aca31b6e84224c41ba06f413e940fb18aa2236cf50a6394abb743f354ae90e8845f101c98f181f20271fba9349cc5fed0f06bed66417146dd6e2ccdd8ca80f77ccf97a3d4e4ff0e13d77ea788920b1d (encrypted)
Stealth Address
86b957da42d65077cf7195a284daf1bcd638f2ded042b0b92b0539f5dd7c5947
Commitment
ce17c460e737fcf1adcf065c523f335345a5e135249b0429a97af8ee69b65710
Range Proof
672 bytes (Bulletproof)
Memo
9d04952def157579f1b758aeef5c317fbd20409c2f2a65efc8571e0013b90212fb310ac4634ccb2a70659dd6897fd777de1ec7fe3acdcdeaab71878b3d61cadae8d1b9777564c0fb868ee9dda20f58931fcffcd3b2ea5cfcf6f38c850972bc403a067bdae0d343938847b345a8a942e43f919a840b2b50b141052af541eacaed (encrypted)