# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
18a383215984eb35ffd185e080fe7bc9b5e9c06b10dc062a49118fbdf3c8cc04
Pseudo Output
6e346b1faaec3968c4ac7c98a430477aecab0748d2005a6f169d90631bef9c58
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
deb1813ed2dcaa36b7890244a143bb597ca498d8ee5a4e7fbe3dabe2be6bd62f
Commitment
c4082febc9208f001099b376968ab8e9220e06c1bfa5191f4b8c3592cd847b59
Range Proof
672 bytes (Bulletproof)
Memo
2dce0d3305cf13b7bc9489376c059b61540001bc7571fb5593718f9fca7babc985a68ab3c3ded87f836ea6d0ba46ad1d790e761e8111ac99f654284cc5f4393ff356fb7a8bf5735a291093205c8146153a97bc119d7dc25efcee54308f202f6b993cfef5dc9623cd5819dc9a9cf432e78ef40c7ea48afd3ae04bac80e0909f6a (encrypted)
Stealth Address
e69792a8162498403c21e9b4ad119734c067a7b4267d4c88b22edf4a2c941a45
Commitment
f4096dca32e4d605fdaa96810d7950f381b262f2d5b3e6e413274b9f9ffa572a
Range Proof
672 bytes (Bulletproof)
Memo
48bcf438a5673f98fc3b20e24802789635137b300fe7e8934c0557bb9d335fdb1251a786fe33117795e9b5e692a97edf06be13cc6b66a5b5a7d4a7d0234bfd6c712b70cb7ecc32db24d938edc507b4d76dca2de8e5e732841d63f2b21fb73cf1e07759c0ac0ec37dd71297a27c9ab8d4ff4aaa744b3f2945766c33559fab0d71 (encrypted)
Stealth Address
3286419807b33a3d2aa354c67abc20b47bbbfab0339a012bbcbed4b2ae14750f
Commitment
b477ca2169369223f7280829e8b434ddf6c81215ac595dbd19dc6ae1327a9a05
Range Proof
672 bytes (Bulletproof)
Memo
cee136d2ec59e963aabc2b6fdee00717b83c33e3d40e22b0d60cfe2e5ade14a4466da75b8381ef702b05e7a0ef7c9947fe7e89b36c0500c06888130bea7234b96ae84b82a27442462be127cfb3091069bed2fc7828c1798ab4d1413b9ca55dfe4e031ef471aa3fa5668ae74c708cbb7937f3e6419c87cfce95f32728adbf58a9 (encrypted)