# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
fa479fbf77dd6273ae1a2f8f7848a04d51ff19e19315d7fc866d14b412342d3b
Pseudo Output
4c5d87a63915b7e135300f719b2e84b829f1991c03353d3a5d9a088c83d5761d
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
1a56c07a150e9b8e793b76083fe998124831c04b128c9707ef064241d740b437
Commitment
46dee615e8c39c67d9d9186e5072ca0e9f972620bc1b0a7eb99f0fa2ab1a1f3d
Range Proof
672 bytes (Bulletproof)
Memo
2f301829bc01b09e126bcc980a034b95eecabf9aac2e7daa16dc0864cac9b3e057d7ba77bea680a19dd0fcaf401a490f46bcdb10440b57558dbcf06bef8d866f46368e307268581a69299d76116ff9d54c72b149b82a6758cc5d2ff03ba1b1b51def173ed79411e59913cb900be86edc6848c858a1a94071716f7621553b5d84 (encrypted)
Stealth Address
76ea2673be2361d0db8272f2ba6000816d48a23cb35236dd16b7263aa660652d
Commitment
9277671c404167df94b05d4c20e7c1a308df2003c23fd91d6d57016aae290d5d
Range Proof
672 bytes (Bulletproof)
Memo
dd8866df957520b017090a92ea930acb7d3692122c490923a2cdab22d6f3f12307e114dda571ddf48019c3074295159328a6deaa3311c1c89d907ee022fe7755d04c0dfaffe215d99f907af8c18cbfeddd4e07b8dcd459126e975a3400e26a6919bbafd68959c8732fda2b67d1fbd33b765c37fbf756f9b0253e276650d9840a (encrypted)
Stealth Address
c280afb65374d9cc1726d27b3339edd434770ffd311901452168473c49db9873
Commitment
e280336212e9bf9b0b4b5a026d33f9e3e4af6763007ab3be8515631d4ff84b5e
Range Proof
672 bytes (Bulletproof)
Memo
3bdbdc2d50a0bc426764f983acd046eff17ee6133434998a098ad1defa83af2d6e76c4458bdbe4028a050987193e05b8e7a4400b079ac91bc6372be85262ecb13347b4b5027871667c67d49a9b91558af4434c156a62dea1da3857917bba85130a7af6339dae8d95be77ce0180b7c6ddcb5243c3eb7377d87ef65352e51bdc12 (encrypted)