# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
4682d14b1fdb79ba9f254a1efffd4ff8ca556db2efef42f3d034d5ecdd225e7d
Pseudo Output
34486da4ebc95861aa9c8db5217f0e3c5fc1cf004a054a3d8059f394f2b05449
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
c878a62f1a4eddbbde1025fc137958d83c876cdf88fdf268721a1b93520ba771
Commitment
e0f6f27086416db5f438d3d09f7580c1d58865f0d5d3d8173231fe81b9e63638
Range Proof
672 bytes (Bulletproof)
Memo
3d32085bdf44010b2b3bcaaf6ff5c089fa241f484975e46877c20883581012c2c02e20337ff7452341534732bed2db4ab4f38bcabbe2e00b3f5c50dc1573da8632e0a6384619dc1dcba4ff6da48f3e89a402c3d48001191b8fdc6c897dc124a2a03745973d43b1f55b4663ba479e02b8a2e2e9c9b104e0d27487746817de6faf (encrypted)
Stealth Address
2ec5c86a22c90487dca27b9cf81cd860d3d938e3d8247170bf652fc6ed8a2f5e
Commitment
ecb978d6e7126e7914f2a69c69d4a81b5f6fb9a3e927e1bda71f8d8782879a5c
Range Proof
672 bytes (Bulletproof)
Memo
eac43fea89ef3f78228a1499f1ffec2d7bbf7efe66f2432e4625103f79b6d9301b12b41a1dd2d1e3daee891d3940cf03cacf65336aa5d6a0835eba602fa725b4bf647e8a4c74a847533ab198dc8c6a6b5b241ce743c761c85a81a2ff5cc8e08159ed80c92a6dbc784034487ecc164552ddbecbf3cd1d1167a1f5041e5186cc2d (encrypted)
Stealth Address
e864763fbf5c8cc5ad638310ff05ffb267658c560f2aad219ee362673652cf0f
Commitment
a40adede961815417ca83c4a315c31741ac5a20663c51357f72f25605530a004
Range Proof
672 bytes (Bulletproof)
Memo
11ac97e828c6cb549166f2f40eaba7536bd8f195d0c927c630643498414eda87a091237b1479cc5f0d769139c1e029a841013731ec776352976533b6ee92b80997b85123ca927dfcb1562c4253cea503fb90299751b35c0291911aab6ae309ad6f954a126deeff9579be2053a55ba8adf6dac6dc1e3a62c7cf74ab9e43ef62fb (encrypted)