# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
d4b2e1b77f70e0e10f0bdbc91975b05a26d0b4e42d3e61639f64ab8ba8cda374
Pseudo Output
2e678d906cfc73971263a9a8084f9d25c47e5a25a24d993941745c1fdf876639
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
46c691583dc505974f0e939c9fbdf32f63be51476fab1083c5d6da62616e5b2c
Commitment
84f8f9e99580c1984dd2a1dd868d6518bfa2141a5f913fc7bdf37e70a2d8ae2c
Range Proof
672 bytes (Bulletproof)
Memo
d4f79ba483e319ec55daa891b3358054537ff9c86a2ddf075d8d00c6f55d8a45e153130883ba318b65fb97a16a586165f968ac0698560558ea60864105bfa68cc77db5aa7c09cdca664a1a9fd93c4397b4cd3f7a71e4b085ca5f628bc3e0f76e92b320225488799cdd7bbf45efcbe55740e8fb94afbfeb89fc79e238e9e42ad4 (encrypted)
Stealth Address
f209ae4814ab4349bb5ff62c90b75a55c8e902f9a4451ee7d5fe7da9ee088863
Commitment
f6b88203b45f181b8d0434747fcb54c9e044f4487b4f31703c495766c8531f00
Range Proof
672 bytes (Bulletproof)
Memo
85772e04f84cb2ca0edec4639ae3c9f4f7522d5817d4fabc232bef8e640198bef8ad0e4c234cb449df80e5dbe3eb5a86d63e879fee9280e4fba6272cd5fef75c951fd3c17fc528b5d7b92aaa9e856522883d98a466282535da0f62ceaa12c97d82fb5e91d00d242896be9a560569a53d5da7fd084bfa0e99ebfdcfe15fc2fe16 (encrypted)
Stealth Address
f432275e45bd16054fb1633562836960edd5e3716001ef2cd9c29dbe57db1c3e
Commitment
8e00c5e58fae8e147fd8a22603359813db0db7195b5dcfdc31746b9425593b26
Range Proof
672 bytes (Bulletproof)
Memo
4843933d04e3ca71d44aaa028e0fed26bb3480e0620a3105026906c424b9c8b7f08d1547a8d30428f3894ed29dae96566e998f6d428130a63d4c150f073d468d9254e409fe6b8760266580c3b718ced9b5cd1f6b87c37422575633099e40342c234f21bcefd6b13d278de531a09905b7feb7a809d23bad68c17e0d54b8d90036 (encrypted)