# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
70dd4257250e80bb93fffc0b7b3eec634dd5b19abc9c8dc343e7e463a2b09f7b
Pseudo Output
2edbcaa53f55e6b88178630a111bedc2a36abf697d2041dd8db18008969e107d
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
c0da2d46b35fc4df2fd0a84bb3d071224954d745623fd103c033dda663b5337f
Commitment
48addcefee91fb7c1d200f37647368e6c6263a0a342fdad0a8d6934dfa43e10c
Range Proof
672 bytes (Bulletproof)
Memo
4eaa2f12f95350cd860990af9bb7e5497e5c1a1460c61fc21550e621d1e19a3bbb2397b9ca6853ccf0e4421c0b18c8cfac08742d17b921bca0094886ae88717019df239e2b29efe570f0c8f208f52ec7f610e9708c33e4123e9ea08cd7d94f724311e5d15dd66701dcd218fed47f422d3cf9f0f400ba00ae4451a91752a240d7 (encrypted)
Stealth Address
e609cae05898d0c471851ede3b45f6388a6668c21d5d2be29066184846acdb1f
Commitment
d23a22337c13427ca11408af6e01c10204f006d6760aea45d03fcc8e9ef2c335
Range Proof
672 bytes (Bulletproof)
Memo
460ef555e89a6b71932a6de16581d7a481c7af245453998745ced00deb48714496e0adaadc9d6e2b8aed6917bfc7550400d858eae4b7ead0e24b2f7070f810cf49a16e740a0b38b3fedfd02824b7bfbdbc02b669bb47bf4e5d105203a82948a80d9b54fde7af8debcec24d662c5fbd7ee499747965e451d65dd9de88da317123 (encrypted)
Stealth Address
e67b3979fd5676bab2d43f400c992182e82c72e8dd865310102f32f6537a3d3c
Commitment
5458c3a0f88a3c8f5627f73230fa8cb53c04c5b0f5cae67dd881c4a038b57946
Range Proof
672 bytes (Bulletproof)
Memo
cdddad9c0bff841c8c8788b28df7cb591e649e04f549c8a7994fbe65be73f53fe0cee239d4f9a9dd09d7f6d5b916c91a8b16be15c1c596660b2497774540e9d453ed31e5dc1626422b1878330d238eabd2ae74d7f22efad5b7cef3f6cf6809222613159dc6471521390f509d8cc8e98cd2849bf1f583d6de03249d42de107fa6 (encrypted)