# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
be798189c154543bee2e7094d7a18ca8c2e4a366ed3fb175cf14a428961d2767
Pseudo Output
fe15dda670d6d7ce5e9bd3b8a9296e858f614a53d8777f7139801bc927927353
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
4ecd489010f6f2e5ab92ce791bfd483d482e2007aa5f8a94a15cffba59a64839
Commitment
149ea34c42e7649766a7dbc8dadbbd012c5c8f984b8dfaa76135a2aaf510f220
Range Proof
672 bytes (Bulletproof)
Memo
c86b3661b57fb84da9bc3c56e8b9a5a9251632856aca8064aba83b08f35bdf8132fe64b0b1574962f62b712b4e1b89bac946faaa7a9a321ed95b63804244dfde6d3fa70e8645322c0b1e82b90d7817d41ffe574ea868a0ae7ac90c664223e3c2bb0338b6b47f816610deed7a027e141a8b458d3e253acd26ed39fa5b8cb1035c (encrypted)
Stealth Address
985fc74de92e52e88f9f66444d1d8d4fa0732c5685d07b75d76d348510d41f55
Commitment
2eb362270360495397807ac48dead6d967a0aacfd2a8e0cc71d88f0e4b25792c
Range Proof
672 bytes (Bulletproof)
Memo
dfe904f94e1392eae4f2338c0826610247a66ece86c87eec87389a4c930dc3f6fb1dbdecbb0427a126a5d76441ea8a4487dfdb90bef019ed0c51d76f2c2b8722cc6f1e6e526ca766bba34d90b1df00417715bc79f457cecf621777994745798b298f070ce7bb3efe686e47656b38c208d935dfaa152b36dddf736872a87f8777 (encrypted)
Stealth Address
08c15152ca61dadec564ccc6dc75294db26592dc04a9934161a9ae8ee8721d7d
Commitment
7c5b4ad243544bb4993e52a40401ff1d7660e57d6e5f367b781dd808b5fe3938
Range Proof
672 bytes (Bulletproof)
Memo
d7e157fd11eaa73b6981d68993a62e579ac80ad701f34940f4be31541c847faace59801a5e7af4616b36b52fb2c7de1dd18328185070578f6eb68e0330f6411ad8536bad5c49fb33c7a4cc7517e7a36ac1d5f08daaf0f5640f2f9b24a969ae75c460d7d18735d82ff005ffc1018d733407350f01f0c88763120b49ab5add218a (encrypted)