# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
4ed47e12468f38914368de248131f6784777df330498826dd0ac048f59966e50
Pseudo Output
40d4b48926afae515aa9b6d10ff71d13421d14d21464ad7d75ef4a8f24264b28
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
0a15921e5e1fd0059272794eb6209ef1f54561981030a94c512553aba9adbb35
Commitment
02d6e84fac27f00e24219dace3fd29429e3a3ed6420b59cea66b38ad550df969
Range Proof
672 bytes (Bulletproof)
Memo
e679c797842fbb3b06b665567eff47163a540f5e1782e9035bf5352e9c4461a35af15fa48b6e62e3e277fcc7b6bcabf033faefdf7fc816dcc7cf548a08db8b895557bcee49c95584a9daecbb7d5d8891786373df2bcd64f0e4339ad45a5410c13a5a25219f47c2a448c4ddca4719f9a55b9daeea5ee75f1964cf94e5b0ac85bb (encrypted)
Stealth Address
7690935fc27e6d6a979d955d9a45df4a612198494504bece7967132736ecda36
Commitment
7e2846562ff61d68b7800c732e38ed43eb67232d1629b54814254245eeb4f44f
Range Proof
672 bytes (Bulletproof)
Memo
9a1aceead9ee547e3c2a44f9e805c9b2120e28108686aa0b0443e338f10f218f611755f52232d4d1e4be96004a86afe3637ba73a170209d32f83eebf44867d9114f135f5341397990eadb94e0e10b24688481ea9394e6140de7133beaa0bfa71115222019e1d0e378c1b417fac5ed96961912214eadb9e7e3ed72174772ee90e (encrypted)
Stealth Address
eae1dca797121b63fec36dae2576df8c61d79dcf4651d4db85d81114e5cb4e35
Commitment
2a3791908130086a482e7be49d003925b155bcb2921f52d63baf7e7fc15cf77a
Range Proof
672 bytes (Bulletproof)
Memo
a2108f27040cfbb852331508b4b3d7b35e4340c3f19f6ce27b692aabef1ddc76c86591fa44f2198abefddeba6bdfe8815fbc2484272e2d621ba031496a0254d9f0bbd03849b79ccc0769e5c0c34e1eebc332ed5c0a6ee10e4e34b65f8d22a47111acc1fccf724c2192bbb4f41e7e6f17b990e73048af57ba18598fecb262582d (encrypted)