# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
1e98f396d91577dfcd368835d9f094f8782d9b1ca72dfec341132b765bbc662c
Pseudo Output
dacea66d1a9a60ff5122f487be1be79669dcdfb0c5bc62a1b8667b4dfcb0055b
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
c46598491b35f0fa81a2d1839016e9ed30d1233f7077188321660d2bdcf2d028
Commitment
282bb5fbdbe5983903eb0a06a0c1684a057cec5c6fa316d47ae543f1d5a5f413
Range Proof
672 bytes (Bulletproof)
Memo
bb6a6daaadfa703d1d716a4f3330b745a52f8b10776d4d7c69f7a1c61bc8238b7dbbf778255f6df07dc5e72d80600bf8840666021d823a56e7283c959ad9b63443a885a09d2b160a131d1109702afb8793c879e3d3191f3e00f054f950a86e19bd924c475cdb9a635098f36dbaeaebd980c03c667ebd2a296d14c9ff9357aa7f (encrypted)
Stealth Address
627ff5ab593cadbe006d502c6e58a69e34976ba1c92dc4c3501eb49753691446
Commitment
ee91fff4d91850051d9dbe60e91c90367f689ea6030f60c4cfc2b302343f750a
Range Proof
672 bytes (Bulletproof)
Memo
4c7ea5a31c4310a400afafe268898743ce56fa749d7f1ff444b87cb9ca42142bbe403e2beede30afeb8ac7bc79e9449ea2b5f1974f6559a67d733af6fd2d29fbb533616211667da8d672510acd5b8179922fb7bf137e52b32fdf8a367832a41e3505720b3598b169bb72934a28c6fe384d2308c557d7df5bac014137fbb4eaca (encrypted)
Stealth Address
ec88a61399b3d743b94d134b690b5cd97ae3b38cdb4204eac55d0f4f3f951266
Commitment
dceb71d793c7d87785cc621b5a9b8c779637a2e49a1022192bc94781c6c98369
Range Proof
672 bytes (Bulletproof)
Memo
a3662e8bc5d5cf0accce49a677059fadbfb9706f981205684999822f4c03114caff2b10c8dc51a935b2d1f1d7676fb43414a52e5d9dfe18561885d5f012793d746f28e1a95773fcd616965a4232722ff9f46a7b3d25e9d474c24de10f907e9c5c6f402719c8ae16e7c206e380e85ccb066c1af406e4da3b4316ac9e329cf3eac (encrypted)