# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
8ad46a930587f63ca9c792bf07c7fb8e33c0511bfab251417781660da0491535
Pseudo Output
5e487abd1138082371d2625937edbb6336552aa80fec477763727054d273a849
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
3841b441ba9f962daf5201af528d040a32920eacff5820525d09efdb90a4d92d
Commitment
707565469302294810545adae5d1c17fa9edb624f4af7c6e7651eab171cd3b34
Range Proof
672 bytes (Bulletproof)
Memo
6feda33876de050ca57af264447ef835a8b5cc71ddc06fdafeb88c8ad100ce5eed76ac60ff6be98ef293538919d47c08e22c40dae1f0ba31f712c780e8f122cd45a955763436590ae14bf505eb97ef664b6c41b632a1bd19df2d90c8ad3ef4cc32d03276cca8cbb87762fa6cb0c8a2bb087ff551e35d3cdc224dee7428984e66 (encrypted)
Stealth Address
5a17804ee4815f7d5f0f7a07726ac1b996499218523b4615035ccb2cc5fd1973
Commitment
62d90d48d7a557130a2dcb5244837e9fa4c9d11fdcd5137191606019aca75c30
Range Proof
672 bytes (Bulletproof)
Memo
3c2c7dc337c4072dc1556fdc49cb4055c59ff0381eb7c4ce8547f9952c811e4db263107a66967c20aa9449489dfb2867d529271836f8d4084629b38836610f5b65cc62c5081b16f98b9475b51008b88ba046b697a6770ced2e25f731f254d06e80eee8b5bc5e7940d7a8ad4f4364a5a650dc5a031f95557b0e7774893f9f207b (encrypted)
Stealth Address
d824cde2d1128720a0b47ebee654ab631f349a5a272e90655c911d4c829fe946
Commitment
f4d0ad75fa894c47a0cbe5f216f14e53de0873c626236ca588d8f5f8edf52f4f
Range Proof
672 bytes (Bulletproof)
Memo
ab99462ee7e6a33c5cb7488b2befe282e2c420f97f243613e06f8649208493f8246e12fa3caf390a49c548b35ec7f274fc79382899c764bb26670847631a109cc22a070875c577caaaad314c9b7409ad7ecb309d11a3e3af6603ed211b06816a044a444fa79d6df7094b4dda6e7c4544488760706891f41ad6c3f08e843d45cc (encrypted)