# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
eaa590db7bd74f5c4d4414b5c41408dd8f5ac242e697a4d6797f9b99515e220d
Pseudo Output
5012e393a7731435d48ff57e6bb41d45ef7cd2b8621d612852d869b691cd7f25
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
848e851f925e54bada3b2865d6b443e29c54d6c4b56fbe42a01f8898fd1ff24d
Commitment
1044c747644c462c048e3393a08650cbd46454b962bb55eff519dcb3ffbf7976
Range Proof
672 bytes (Bulletproof)
Memo
d18be496c27429ade536be2dc8320268d16297366c3723d14ce61195545784edb00437528f78834525725b20fc40e7718419ed9a2bb144a6c16c7d3cb42ea920c3b814e50c4ccaf73a309e6134840c462e120d73aa4f6f7c4147058cc3bf59b4e852165a2545388de261d0a0cb1f3af5c46114adb4349cccd802ab567e1a3738 (encrypted)
Stealth Address
dc893aba7b6c5535c72f2fcabef4fcf5e2ff5752621f0854838f48f2e7961b42
Commitment
982fe92100e9a3239629afab0ed61c2cac92c47f1161bcebf84a97d427442b50
Range Proof
672 bytes (Bulletproof)
Memo
74c910f8435c520f6a45116281d0f2da9b53bd005b109536ba036702f58e7b6d1c59e0f79e75314d3ebd8fac6c07e744788877207ef2fb6fdae6e59a0546fa0a18e3968b3ee32f10ceca1ea4065257921675f84e9450d2ad83336ab306c39c96ed6f04a2c2144dd67b5fd26aa308d4addd90f111fcf65c3b2c74b1d038b37a79 (encrypted)
Stealth Address
d432e11f7accafe8f5c646a4b388ae9cbfa40a713499a14e446f7b7718e75957
Commitment
682b77fc715007bccc99b196305c84f78efd0f04b00a0577a8ce3aaa04f09b61
Range Proof
672 bytes (Bulletproof)
Memo
649ef1372220ddb099d2c3e84a1b373d10352ed3b7338ac181f751ed246dc3ee672dd8dd9a109c5bd94d668ed15bfb824d9ea75ae0968915cc6ffdf03bfcebff7e55ced7c4ac35ff43bd317ab249db5a7c1584ff5c539e0697bb1dcff9e1eadb79961153b5c439e8693203953e1340631db30aa2a56193ab3a20cc65f96dc9a6 (encrypted)