# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
56244609121caeb3dde6d5ac10a5f10e347f94a00b48c5958d50d8276297ff26
Pseudo Output
8e95ef97c1421ad7260a01d9ed30e5d4ce715258d6b7a2ffd79b3e58c159a41d
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
4c4e1f2bfe486c96f152ca4a8962ec43cc02f961f120ab16c84ff7e9cc7eae15
Commitment
1caf3179e54b340fe85f7e544ec6cbef35cea027e73e3f0808bf0020a9c4877e
Range Proof
672 bytes (Bulletproof)
Memo
39946760de91a8945fbe3214f3e012f418b02a48c916811c72d4245b9b6f4c4abe79053220ca528434c447d6d029921fe15382c0140f9dd8e84c0a2ff7965571bd6e78ecfacf5ef12084cd151c4be2420fa07bc8a4d47562aaa12f1f9e5123dfe9b8df74f0611147a774e2e7e8080d631ebd9155c623479fd9d0c7809f221b6b (encrypted)
Stealth Address
d04f707d6229a5f2206aa6962192b4d4b434ad503d35ddf40bafa59085487a08
Commitment
f69002fb0cff9864dff721cde8e7c893fd13383e76e4c5441dcbb79559592e25
Range Proof
672 bytes (Bulletproof)
Memo
370971fccef59560023e484774be0b3de9fbd47562d6c1b7dd49ad7eaba38c0e1869cc9ae055b6b98f4144401e7d5c91413837c6921207222b53231b6fcdda81b1f3d7f7242e40b9131d7a3ca7504cb95c42257546ee26612330eb9fc8e6d4de0eacb996f72dda97949ce3cbda7e21da2d9857ab5bc6eeabfe44a72bc8421af5 (encrypted)
Stealth Address
7a16a95e78ccb8dbf14e823ad60601d6c282222a85e9f2fff274a7e3380f0f5b
Commitment
d666af4dcd39b68e39319fa1671ab1fbb8a62c932eae07c13ad84017756c7f3c
Range Proof
672 bytes (Bulletproof)
Memo
c26802ec440cfd069601007f9acf44200992f7a91f7b01053a2cdda17b758ff2ea58211964ce18557f62fa5b6b986de2f9a8c8d5203ed1814b3e1de4608595070d2b52e8b99c362ab7ee060b9301514dba3c3059736919ca45e80df3e8ee66b1638d861650dabc6ec2e8c226442e79024f28ccb907fa973ce99220cc1be2b3a6 (encrypted)