# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
2e32c74aea36ad10bdc3c6b16d990fe77d19828fc5fef317f69d6e1c20fb245c
Pseudo Output
6e0450bbb719f18ad53aa1cc99fd9a90c8b751b18a8acf37a434ef688cadcf02
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
4c8484994f352b68371ad3f58007ffd552994d95b7633bcb94653858a675d15a
Commitment
a8969614d45fc60490b6e3044175b4105ce63d732a28a74c42b6345d6fee1b68
Range Proof
672 bytes (Bulletproof)
Memo
405472b5da14ca27800cba464e40602e8c3fe18e6f2f4412bbc702391886d5106654a35533a9b7cbc070d1aa3c78540ea365eaee3beb0b94cdc088dcfa7be15a40a42715666ceccc5c57f74223665aceb8f7520b82eefc9c055b49745d77af50aa9add074b7e3ebcc05852dd14025ca66cf75fc975550942dfd362094c1079b3 (encrypted)
Stealth Address
22d6ec61415de5817591fbc76ee9248605f11914ffeb5861842ee5672d0add04
Commitment
aa948cc6beb9af7317de15f058ef0d012353155086f69cb557317b6629c5a12d
Range Proof
672 bytes (Bulletproof)
Memo
09739c6543548b7ba72e0b63f344e7aee96dd34b0778b6bf3398dd4d0b64ba4571c4c7925d27058f0a08bcc0b325c535ed6ab80f81655bcd119c2dd4f707bbd89b8e83ac827089428359ba9c0ea935c49437a25be255120a9f94fde122a524f2bcb0173991eb22f1075e3b22321f7eb6b354eded4def2531cff39687539c0b9d (encrypted)
Stealth Address
34abef5ab2d59724b4d34bb29b70f3601c3b82ead06ead9b3dc8ba17261dda6e
Commitment
3410f8ed97dc6e4ff75d51a2b3a5307e5fd55d3c675cdde7fef0376c4790266c
Range Proof
672 bytes (Bulletproof)
Memo
22972773e145ec5dd2de5e3f880f6e7122df5fc0bca07f9ae6a20d06b397610c461d6f0a8afff3c96d81ef6e3d6769a6878863e265e3b4f065fc3aafcbef18ec6dcd0696bbb514016fa7d31a51bc59a8cf71b19e4ceeee0a445470ce0a6063ac1ae180e1c8b3772d4843e78df7ba3d897f110520907a41dcaae1ac9dc810f5ec (encrypted)