# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
c0c85a4bc72acd69bf4511b4ded4d8b8875663223863b1180587ed13f98ff766
Pseudo Output
3ec13d8214f50bf334e6d244bc04a25ed4a5ad73afc5723b413d8974f058fc7a
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
c4e0a7564a6f04782c65f9e0925a8eb2434fff3c1a9355f7148ac5d26e824d58
Commitment
166f0ff72f5fb3bbe3f1c2fa23d28eb463443bc9e8e58f5fb593fff2feb14359
Range Proof
672 bytes (Bulletproof)
Memo
43c2dbc0aa7a4fa81e2c264826219dfac5adf717fa93666c9539fadf885a8eb75a500867388a1e5ba7b3ff51104499fe5e5cb47d8431d4ce7ded16b679139688b11fc0cf31791d3775a91463e3a48208cc60dd9c7c2cfb330f35c0c69793c3120789e4724d64a07a781e1330b459c0a495f5d7561469a0497f5f6c424a2d58a9 (encrypted)
Stealth Address
4eb3c1da9b6193b73c7c39dc653abb873bdf3c3130ef53226efbd53c79027763
Commitment
20eabe36a2611be824ad11cf6ec637f6c77c5bfa9f331af152db022046164854
Range Proof
672 bytes (Bulletproof)
Memo
bf354321ae1070e90cde8a6b2b8ff8b8de9681879ffecfe043090ec5b02d882a4996c85a0a63684f878b0b4059ac02aae8cf9dff55e849b79574d6c84f178d3e06603c5a2bb4bbb8e6b7be181c63e9b2a9c9837e33005c33260f07c932d600d3cd54d8392a424ba55f14234fc3972ff4c65e715cd84be47089cf08459fd832d8 (encrypted)
Stealth Address
10fa79c698a548b86f47c75bfcfb681e9e6747822fdbb26a122bf44d3c9f237a
Commitment
109f640bf24217c9aff43a9684da1f62a26f82070bd3f00f19ed9a153ae54a0a
Range Proof
672 bytes (Bulletproof)
Memo
10faa5fea416878f08c9539961280a17f2172fbcb6438b99509044817ebf8b488c3d5dc9e032749cf08baeba7b8d7d52af911f4925a53e85aca230f9387f284f8a21b1ca32b6ccfdeb099bddca1320c46dcf222d2f42a9fb0c49d55daf8519a541a204746f9e2f86cc80f9b8c515ada89efa48f0f840b4257ea1a074f725b139 (encrypted)