# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
4adec8ea2bb29a525f1cc6ad63ed445f2608bbabbca6d1f95436937a911fd76a
Pseudo Output
9259f0489346e39f38667cc53e0d47e92412250910646b62a6afed41808e5412
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
a4ee9b0f4dbb6870a1c279d167d0886f11be8684b457eba91fde9b523d0c3231
Commitment
000d46b768292997545f725c521beea859ec8d73570ae6cd029ccae0bea76c40
Range Proof
672 bytes (Bulletproof)
Memo
7d798e4cd26b191095dfbc9eed5d5e2bf49550ae77d2079e06e9a334dfe842320d27937b45b7628d72ddad4b0013c1fe767314f3b53f255afd12a4c4cff08f1f773ac3dfb06352a53b590bf038cccf2244c8a7e9333bec5eaedaa5507c8827d767dcf6aabe5d41dd9984970ce751b25a7a7d80f1b628605f6373a573a6172130 (encrypted)
Stealth Address
66d79f52cd5c4c038b7535f9be1414b7874091c0105ea0c9764465e06a412d47
Commitment
2aa552d1e91f04c84923cf50f2ae593eee0697a9877badf30d1e0dbd488c4152
Range Proof
672 bytes (Bulletproof)
Memo
46df3dbd3339fefa9e37927e2d680ac3cb2be0d9951325af7a755c1a2960ce1e5bd3e2a3bc5f56110077a72fe08ad452770ea927ae5431e5ba07c07b8d9e875ac0b8d43d489aae98fab02964de18018c85ee4f72fa4acd521c9028d60b5ec91f3b5f42c41f0cd0ea743d3dbe8f6c0dcb91e6a2f20227c5e1e63df07267492f79 (encrypted)