# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
e4a7873977d7d11637ffcfcc9f6937b535aefcff4a2e9a696b701cd96906d517
Pseudo Output
14660466df451d7c02773c94b33182a3f04a5c7c42b5b97e6bf6b62253a51f33
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
fe1710f7081ddfa46f3afde5d653e02fde49c510b9187d3499f52892a3d8490a
Commitment
0e0b55acfaee8144840d03b4209e4d35ed5d215e83e0c579e16ed3a0035f6c7f
Range Proof
672 bytes (Bulletproof)
Memo
dac6c721d476495dcb7ec5413c66518b9b390ade09bc2cc894712a71207ec620ebbe8f4f0fce86d4ab3188fcbfbb94abfdcf7b73b2e333c0fdfedef8d0c8b51d4a2cd5f0e8376d26cd3186e1837bb79ad044fa6c54cc745a9f217eb9c35839d3616ac59f683890717c6ad351db805b2757d38ef48f0ede1b6e120abeeb605673 (encrypted)
Stealth Address
b47709ec25c36a26f0d398871a3a324820100e16fa0cff6f75544700810b8d00
Commitment
5ef2abd2dddde5cca621a41fa296d451f5498b52480501242671a89bca105621
Range Proof
672 bytes (Bulletproof)
Memo
e5119515a6546b7a2fb6bd9e50f0b42554a27c6f79f08899cb949a47e4e65a8e7c78f6553a278e11769db3eb0d4cd23736fbfd23402d0dfc465dc8887a2313f564dbfc14e66cfdbc1497009fdde2734ef0756855a4048cfc689cc4931ebe3191f194b018e024399eb10c44ed4c55d89001fb761b559d78a162820141948f605d (encrypted)
Stealth Address
4c59d0e8aadc1d16a99f668495d25cfb9afe18f9d7ce0635e9290e5b6a91d500
Commitment
864940450e74b7e72fa1610964c8a3d3151e7af490e574c7bb8f750993713e2d
Range Proof
672 bytes (Bulletproof)
Memo
59254983884a3db02affb5922219d526f71939bc97bc7e2486c172fbb73ef04fb986e031f444968af33b817d6204451439b582c3b58f39aa5d0cbe7c138a3163632bef45fce11b65202103e6b9f04b41d61c7859064710bde77843629fe705d46cf8c7895f74501308286d3ed1f29d2c38fd710abaafde77c37588af44821485 (encrypted)