# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
2a080b0fc881bd6da8ca9a0b3b5639f698b186040954578329db2cd5ca6fe901
Pseudo Output
d4c9890f1e688b417626921db6e3d9b85e859416d928adca57d0e95a33f72772
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
4e687db54a8db78f6416cadb7521e618b7c57dc658c9cfd90936d971f5aa1961
Commitment
46e6a84937f98a6b335669aca9ffa7c9e601fbc0f26eb914036c1e541d7da32e
Range Proof
672 bytes (Bulletproof)
Memo
0a7f8c48ecc48f5d197ef79a8b7dfb9e8f4873ccbae320c1bf58454bfed31c4df306fd67efed9d509507e36409877fc910250cd518a6798f204e5e7891f511ed29d3ea462a708ee3dbf327c4991dee72be2d08360aaba9df4565ffea650e5dba52a7587054993e733ea51106a896f0f51da8d3b8bb4c4e13b936dbeb8e44bf96 (encrypted)
Stealth Address
80415a4da96ca772db57df3c0bc777759deab0e79c759e6d16d598b601c67e22
Commitment
ecbf6d889735ad7c97bb789cef00c330f633e982add6727ab09a0fb070cd2538
Range Proof
672 bytes (Bulletproof)
Memo
b58dd8575ca0cf0d2696e7b7b8c38d6841e366b3b0bc6f5a8feedc3d5e81c0a85700057ac0f08a3032d7e6a8df411138d05fd832c0f8b6a300c56b33da92414ce0d9a02622413a9bfaef41e6f006593f502b912a3e277dc95935ee2fa056eede52e70d5b5a3abd976aeabe77c6c1fbf70d2158bd12daa1bafb82fabc339db493 (encrypted)
Stealth Address
52a77d846e9a2cb613fb6c2549a723f35fce24efcd3c86ed4af45adc5fbda003
Commitment
58907b8fe047789cebf2e0633c3f8d1d32fac36b69e7b6012e523a403674112c
Range Proof
672 bytes (Bulletproof)
Memo
8dc2c73fe6c9e7405a04a5940cb679930ae86caa541513454e1efe402886b973dae801b36570f04c7313b05f27a3461a0a9ddba2d0ee0351fe12ebb455e8d183ec72af5943b091a13903422edc256e2b2550709e934cbafd92d701b587d3d352214fc8401b40d1293676c2538b1dc76979f2f86c66f6df096f42b86d99248bca (encrypted)