# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
46e4c27be40b1ee55eb9ed83bdfb74fca6002492dc39cecb16a4333ca4f9da20
Pseudo Output
444a9dc8ed90cd6cff903528e0912f49cf40a2ef3620a5c89af51d018dbfcb79
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
52c8348bb8186cf98e0650a8c42e68c39448a404325d51b40f1ce8b989eb2c1e
Commitment
54d7837d6c9c5714b86d93ece0d3735ddd79775fdd0f1b5f99500c7a7e06896b
Range Proof
672 bytes (Bulletproof)
Memo
aa7473c86d043569f6f29aec0e98ec8617f4f3c071859c8f2aae6d426433bb2e16c450ca0a14efc59cb509fd0a9a07f9678e791ef0c4b52da9f553479047f4310d8d6500afc5c5cb9d46a3df81263c79e2eeb5ca8723ddb368f00ff20763bb79463e7ea33ce5ed4a7c10f1a1bbade392ecd5e59dd5755b68af42a4a66c441799 (encrypted)
Stealth Address
204d95c50c2270c5d8d47f4e191c794d05dc22cf0a9c7df5d4ef39c0dd2ea74f
Commitment
5e838561bc06782fa2af3345da0ba7bb2e19094c55822404de4db57c6aaff13f
Range Proof
672 bytes (Bulletproof)
Memo
c2fe87cc6ed09dfbbee1383a450086d7dcca33f06584383ecee3ae76e63b8d321979b561bcfbc66ec9411b5823907a2ec0519b494c8eb56bbb7e9c879c3cc8dcbdde524cd0a6fba2e0248a12fee68a065c0f9dec3e79d8b683093330cc9af63210f17210074f74087570950b9b05932cd3e8429e251f22056e4222fd95968f3f (encrypted)
Stealth Address
4e01bd5c255ed9d6cb34e80c9d808b2eddbf92e63aac6ca980646a6a024f6d39
Commitment
8c26a70bfd3fb5bf2d7f6948bf8fba9b4476631515993867bdadb629b892bd08
Range Proof
672 bytes (Bulletproof)
Memo
5581e9b39ac3f45ddd51f1e86b569bcaf2cdf8a4621ab8b1c87b3beaad73ce35476410287fc676f6f7e08299c041638ff9d860358c0b4c6979cc5ea8df5612116ddf190b866e6b677051716bf76f56a239943b703409d4b67c756a1d2b52572d99450e3136a00f13c8c8558e3893ea95144abdadbf05428df2b2af184729e1d3 (encrypted)