# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
4e0ec3bb305af1e6bed8611e7520960f7dc1a50baf3a7c9b41ecef55ce6ff462
Pseudo Output
94192ff0b959b9affcdc1a5ca6f559c9ce71876fcdc4752f1eda357404989766
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
9463eb675e56f15d1f87dfacce8ec61053507b92b9c81a18b6af954a5a543243
Commitment
78d3f3ffcda11b9ae0abaf82e4422eede4188fbb656adaec0f7279153c29d00e
Range Proof
672 bytes (Bulletproof)
Memo
24d445d0f0597b41ddbc3c751bc80314288b9357ab603556ab2db68c64cad9a76f90b05ca31bc7c4997000280d2fcb6147b47c31312d03321b6e74404e83065d63317ba475a1741f60f7ddd8c25a75dfca33fb8a7b0122ed5964e2bbeb9cc4fa2eea56443f99d42d854c83d872bce4a15b6ede739a03a1014d86c6fbe1780d50 (encrypted)
Stealth Address
2c05af9bdfad40c3bcb7f487cb4b2bf12da3c59b05a5d663a74e26807ec7cc0b
Commitment
2e5e9131f2aaf7999b654c9299b1d395bf052deba66228f3e5fc7a1aae67f176
Range Proof
672 bytes (Bulletproof)
Memo
4227eb800e64638bec6664144219388ae567c8cd070920c957a4aaa1c3a8217a577ea354618ab09631dffe0c83c0fde4f0ba35c9fc63ad4b30b9ad1d1d92230427e0d8eda45ed57e1afa1203a618028e49208b5e01fc5edd2c800aee55e25da3dd0dffe02955806ce9ed068d2702d9976e3dc931165284f8aed37d0c60c51ad8 (encrypted)
Stealth Address
e69ca940dd425e54c4786e3c0454452d37513e4c085713b3c3a8fcdc0c767e4e
Commitment
025c10a2a215d5cad3f39e3738a0596afa6af4df2271286683099f5a32671e28
Range Proof
672 bytes (Bulletproof)
Memo
807241d1a075112257f037ed71365202984c0b76460edeaf76fee513b998ad2a75ec017fdc886c52fac57ba4501363daf3801780b10f7ab3e5d322375fcca8d2a5dfe61d3d6f7dbb6a25c99dd4db370e26d9990e56c62788cd20481caf7854f468ac5e84af7643b5f6a827badcb1075309d3d7114049c6baf16dfa7d6896ca46 (encrypted)