# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
3ce3c34faedaa4b6f7baa04804765464d880d994436da88c5525adc8e7303f2a
Pseudo Output
ae215f2d51181feb25fb36afbdcdd719c1d0b6f17cc8e4d4654e6f3d560a8116
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
4485b74fa9dbcd2f6b62052908e0cd8f74bfac6b5d9a0ed8b04726197d75d93c
Commitment
c8bc9573845c16fc9a5a2abf0ce6d89249ad86f9f72bd4e03476f315864eda65
Range Proof
672 bytes (Bulletproof)
Memo
04942cdb6fe0531a87097bf34a53aed62f3e92d43077dbcdf176d2dd309f7eafa3e60d6739c687857f1e087dee525fc7a71f38f745a3c6d0a9a9777e4a887812048e2e5f9076d42499dd0a2e386424a24d0dc3eadb440a1bcea97e358bc9dc92c705b8e5643ad93c9492e1ff8433204251d593217cabd76b8e1ada962f2b7280 (encrypted)
Stealth Address
1e8998ad9b6700e86f8718cbb663f5d2f5ff38057880f3795c7f81f9d06b624f
Commitment
8e22a448f73b2fcb31b040dae8b3e2d8bd5753b6306c1d7e15c36da2d838504e
Range Proof
672 bytes (Bulletproof)
Memo
01e0931819ee7b6fd0d2f519f9272335d29632bfe6fca08f4d63bcc2aefdad9ca9c10cd85717a8407f2de00913eaad894486fae18f63d5b86ba3fca787d56949add0b58331c6eaa2860fffb11dcc27a5d753337abf8c0b2c5212392dfff0388877af4a56b70b60c085757ea6ca35f13ab97a2b4e3398aca4c4fb13514db8e4e7 (encrypted)
Stealth Address
2885cdd0680426274d60ab1950726b29b7fc183ac904d7e44acd852df8536270
Commitment
38721a0e0862e7260c1330c72ca3b184907079b6c955a1d83552d88e68db7279
Range Proof
672 bytes (Bulletproof)
Memo
5892ada3b4dd7f0f4a62aea3bbe6d5396cb4dfde5d38eac1c47acba262f6c1b02e25bc2f34822848b68d0b6e1e946040139ac36ef80f4afe957bd7e6b8d38e4790f873cedc5b6ed3a183f0586946b405793620b5f84d6dd8423ed15d7e9e1867feb3be7717fd055fd1cf975d0a6bbc23fa4ed586a8431ba4e5285dff8148e793 (encrypted)