# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
9a1f3096a424bdb850ab52682d7794ca67940a3111ff39c355628c7810c33378
Pseudo Output
429367d3307b77ba39432a823c2c5e64e712f4405274e05472209d27dc9ff024
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
b46eebc45c21d114f065a36ac358f9c8f5aaecedf2d0bc47d1d103ca13f3503f
Commitment
e6716ece258b6cc84c3e8f7a6377a299cc71128f13b99f946461b5f8847f7554
Range Proof
672 bytes (Bulletproof)
Memo
3ba4b386d2f4ed36c0225315ca9e3d60c38bc6d256363ead4c31c5923093d83157c9c1ba5c3f9889f9275535e6945b69358bb911012f709814b94db39a5daa5897bf10512447c76934abb65e202c44378daa5d45aadfd04101785c114cf7571e94214b6dc9667499951565c6cbb8aa8ed5a03c8f65f4d945087090c103a397d3 (encrypted)
Stealth Address
c87751393e4947107e459dda96ab31a3ea8317cf57ee29708fc58b94b9a65566
Commitment
469577c4efba944e88da26829979f64c08dbe77dd0b1bbbf48363ab58a137d34
Range Proof
672 bytes (Bulletproof)
Memo
1a970dd66eef16a79796591bc5132b8bf1d17e7762ca81f9d594e049d6ba251540132128f84f848b4fc9bd5afe5f4b27127f0effa9614f663dbe0fbc62f3d5462993095e8a71990b45773776ab6fbc21eb994f2da7679d9009750aaaddc983f6f3cf76a2064d1799ddf7afd553355c83d524d202014d8fc92a31193de3094393 (encrypted)
Stealth Address
b4e8e5c2ac616a2e9a13b91493f1cf3400bcf60e85757ebe28cd749d810ae51c
Commitment
6e7de5d619350219cf31b11393e64f08b0de3dc8d2e9a7e347c3b4bf6130b367
Range Proof
672 bytes (Bulletproof)
Memo
18b8f273f2691876bff42a029b8b77107dc1b84c73a01eb3b97810a829dbf1bc9ae679ba77e0f7a33c11806f646c484f2b9423366b7337554804906b39bdf7b2969308ee4f91b7b590c5d203d8776a3fc9f80a52631edb973d68f83499431c9b39acaf61356f6e2c2b15c62e467f2a0d8049b312b52aa2755fc2a9c262c5472a (encrypted)