# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
ecc38157ab1c54bf530ea2d0a81b57d044d2f58fd4e662628a211fcbf1b09a0b
Pseudo Output
b2157fbeaeafc7ea845333703dd18844a307286881a144a4fc11ba67da4de03c
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
46a0856e680c8d0b8d1d7439cff8e37ee289774831deaab3eada7eb21456af73
Commitment
3e4f2e47778c12d1692685de5d7a7543c8605e8f3eeec02af9afcbcc760c3613
Range Proof
672 bytes (Bulletproof)
Memo
16abc1455d1d550be1183ea13765d61645f749b1283a13995c3ebb8d53ed792ca615c6234e8db9c12e351f8e07625d4d83e5eb93492d7ceeea9b66fb57d74f324778aab648a0ddcce3fb90e0fbfb8ee77935b11cbf4aa84e6c032eda8edc825abc18334fdd470b9600bd7b3c4db6350d1aa7beb32b00033638333f45bfe67d9b (encrypted)
Stealth Address
f843b73c37b9f8b1dc1701e5644e4127a5fbdba01ecfa1b5b2fa625588649705
Commitment
6c43a097784956c78d1c723f00e3044fb59924a87d2a755436d3183508ab557e
Range Proof
672 bytes (Bulletproof)
Memo
0d9505b9f6b53c92900a9241fb6daa7c6c96e77e1bbe09e3ae1a998589b3bcc34d6bae37814f9ef2a66c30605670e12900a7c30829f4532b55ffa35f1e7ba48b64f3023444843ec676702349a33c6b6d2230979ee9238ed35ffa6f1f26bfda85e144e57f510cb5f92ca6c1b83dcac8e58bba17f2142c7d5b1469ba5c5576b369 (encrypted)
Stealth Address
4825531f87882a32b78e3beef27189fa235959472dc17ed0cebb7ff66e306961
Commitment
1666deca1f4e077a565cee948ed96e60a97a526143fd030e7664537ced6a3a45
Range Proof
672 bytes (Bulletproof)
Memo
1eb7aec54b0ba21c52a4695320b6a3489d901c0d2f52e3faa2005ea3ef90c857c62725428ad4033c87bf7e276e1985df0ba551345e7f6ef244f7fe1343b887d2fb332ae0015a1a059ed4162b494d02a342a287be799b737199f055744aa274527262660eed450148d7fce1376651a49177b6aefe9fce1ff74484c9ef4ab89f64 (encrypted)