# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
2494861613d38ea192464029e2c5c2a25b478289e2c314efd93e98a2eb8cea78
Pseudo Output
4a46efe6e29f8e6d6d3ac031ce31758f020d321c8e4617f05a85658172396231
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
e4bff7a521f4202cff9b4ca465a9333cec503590dfc9a5983fed98101d2f9143
Commitment
1acf1fe71f1ed86d5831a2f627b2bdc6f297b64098d8d4f640721e7afb2f1119
Range Proof
672 bytes (Bulletproof)
Memo
ebdd6c2bd2ad37e97d718a1301d6e593c2225fd7211562dc00718482c648571d43aedd9f6035828cf9a117c668d430c777806fdb73f75b85c2d44e58dd6d29f9dba70e58b129ce4db74d9902a645cc9cbb166a4df22985aaa519ac63eb2aa596ab1c1a7a9bf1f730e416fc56694d83f434056334c69eedaf02ee94f28114fe01 (encrypted)
Stealth Address
8467600f07ec750a84243984efe4925467a4f55e18051610de08b6a92d0cbb53
Commitment
6ca1d51def6d6f733c82710b656d296fbba580cd5e4fe3dd6e41d42e77904837
Range Proof
672 bytes (Bulletproof)
Memo
e87345b3f24a8464bedb9ac5cd3b23cbf4f1e928dd809bf01d6169d447accf11812b61a1d865c839048b43d6b413e142558488d810204571fc24da20e5b886f9e8133326fa5833b0ff575c82547a1a4bc224361df71b6b11d806f5567546ecc3a92085000c62ac0cc055ce0a558408dd77622d6223d39d6d2f95ff5e6a034692 (encrypted)
Stealth Address
32887e8ee6c3ff10f455e6f3ced5886b55b9783304103bcf0c6fae92928b2323
Commitment
74ae8e54c66d2fdfa96cb0b9e4ffed4e25f1a20231a865910bdb4a347955d054
Range Proof
672 bytes (Bulletproof)
Memo
0a7077074a129d1778b44533f6b6c7d2c7b30657592c8b8c8a06e19cc1ddf8e8b7a53ed2ab0546d54fa9b2d07f33a162d3ded805c4e42ced4559fbd713fa29d7b9c24a27a9bf99c37c8e739c538d057f186f02649c406c7d726f69c3e99aef48f9a3c025da1cb17eebb8c1432718ba670fe51467d95a8c320f97952f79b88a6a (encrypted)