# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
1ad6e4a80109fc5c7a1f022f6fada87e317f115bffd6087c44edc5d6b8a56851
Pseudo Output
1eb394e695968b4a8d10992ed8c957a2f29336deedd90830fcaf72d2c3b5f61f
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
46809f63ce8054675469781ce64cee768824ae52ab5a23fb0e0bf0e6fbd5466d
Commitment
4eaa1e1e7d8a3e769556b6f87e2a741f7a1afb1251044d2146751482e054022d
Range Proof
672 bytes (Bulletproof)
Memo
a46f8af98b577d0649dee849dd48d3a126633556cd537e5cfcd080a1f536d5b71165f67f9f17f8e25ea303d26f864c01e4af07e6189b9311fe8ba1e181b09f7b34f120e13f6eaf85097f897a562eea23d0e8d70a282ff41f24148c257124bf1f5352aea8d50cae84639f95fcb9b21c7a6bf4570327900597c674c8a3e4e11d89 (encrypted)
Stealth Address
d8fb312d465515e51280fc582a5a5688e06ee9d14a9cf602d30c97c43d38f256
Commitment
409aa463a21b1e1abcde7bf44997fa3b4a08e59f143045043d3163ef52371553
Range Proof
672 bytes (Bulletproof)
Memo
3e3ca935618559af1211ef692f73e9ee9d7ea7b3d6b787e77da5588be4f03808bfab3b0e987c6fba753fd09aeefee6bba5096a5820c26004ff2b7a845790d2ef395f709a902ed5ed13c7e575b29ae19a8d62d53a28438ac16c0319ebdde6a4c4dbdbabe7f80f5a426b8c951b8862fbea7200878e13b46b3a62d90577ceb8a6bf (encrypted)
Stealth Address
82b8b622412ff1d18bb83ad8438cda80fb15e9b0a217ac0d13d4ceb36c4fe45e
Commitment
e65fbfac64c46f0f3e7921033afaf7aacbbebecd58556cfb2f2889a875c4a239
Range Proof
672 bytes (Bulletproof)
Memo
11720a0aada5f144274e92e94c8fb3a74389aebe120bb3a10449c7c35d93834dcb8cd60095cb05f440d26f4d57f1cb189fc31886741f6e94baad7f7816b429e4693f61583aad988f2551b496b4733ceb7f3cb15d405c9b9a99ccef7b4d7b849466b5b954702724b52227d2417a95a1fc2aad04b8ddac20103438af2981236ff4 (encrypted)