# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
f4dfedd62dc456a937b855e5085efa57e0e4119373ae7cde1c321b29ad981715
Pseudo Output
e48766a832675bbcec3d55541c770e306b6b6cab99900b7eaecbce8308e75b3e
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
a4a5205e40c98cc473d381260c2a791b1f6d10c021a082be049e82e084544c65
Commitment
2850d7127997727df2049ce8245ddef4def37748274928abf8a12173e1457e18
Range Proof
672 bytes (Bulletproof)
Memo
86ba1f251a725b4678ff06c28d99f89503536f185807870977c5b7cab0af657b1ea8d4c233ed25622317df291a1f5d974c015ac55e8799444a95b65b34d1755aacfb032fd04c521f8106e661f444a16c5d3b9ce603c451764a277ea9a1aa4b120158c096d4e1bece9e8f45ae9556facc5e48564d683c8aaa5ae245e8ce43c1ee (encrypted)
Stealth Address
4c91bdc16a5b8f386c658bed46fefdcccc44aad039738befc106c393fd745e54
Commitment
52b7b8e5bcced73461f944d6a6917775a9310a9bd88815e6433c03f1a6508f1d
Range Proof
672 bytes (Bulletproof)
Memo
294c3fd23123b4513b0448e5c6928fe3cb8ea6b06eb09a969683a4f00c7a2b18bd8c93605bdc666a35ec9b7f2366ff49591750f9c9f4276c0dfa7411fcbda58b67b89798a0f81b2d8f565f195eef441ab5e76ae57977e590da7a461c6094c4f5256babab1c2adf61a7235df8ccd9206eded2ffb0e3965d6fb93939b0ae16ea94 (encrypted)
Stealth Address
0e49af1ce8947dfbec03c096466cbe7cb3b0ed33a1a9ab224edfd2711891e164
Commitment
3cb2f0cbf9f7c9e081c65e5cb72953696042ad636268aec957c624015e07f904
Range Proof
672 bytes (Bulletproof)
Memo
11b3c86d2bd18011cbb8476eba91af774bf772014816de5668a4666cf0a001b6ecd8204a0ca761e233cc15b624e5d7ebd45dd8dd1de5b0552e1bd4c523f27a144edfa09d4c08e2ccad309ce484d8de4f2bbcc455cb6c7ee9e84f4be1091a90a0853fa7df6471699b4c59e3700039e72fe4d6dcf8bc5ddea5fe369769204fdd62 (encrypted)