# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
3078bf0b2eac911ea216baa50a9dc6fd6acb290594c6464b279581b67984483a
Pseudo Output
ce77024db9c6d1678719766a3b2a441d518fc5ccb1e748bbbdb947ef0dcb7e18
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
48d4c2683f64c1d04301278d05286b7565b7f9e0544ee1d0f9aebbedbc0c3901
Commitment
dcf0c47adc37fb91cbbeb21f51f27613b60d7fe569ae64862889d0ba3e539a2f
Range Proof
672 bytes (Bulletproof)
Memo
429e04bb8073bbf253e83ab75f7897948037203397ab9622a0764bd59f9b54154fd28ece90ec1afdd7b0372bce8f8a0485e0bad5e25f94db882b8cfc78b2f6f1b71945ac2d8e23a766e270f3791ac3212f137104191723ae8903bcb9afefd3060b93ef3c46ca3eb8a19f04e5902f7256de99142e6a16f0f755dd13f01b2af102 (encrypted)
Stealth Address
08f8b2cc6f17454dcc46d456a2984e27cf24777723775dcbca1695f71ba27b48
Commitment
f6e35b2f1ecd5e8979f1e1479c629a7f5287c425633ef4e8e2c6716b7a9e382b
Range Proof
672 bytes (Bulletproof)
Memo
1e38e05d504cf86dd0a0cc115232537c9cc004082ba7b4791d44c1c2e5586211960d70e78cf86a0d943d4d4e765c0073111b353b771ba4cc14fcb7ce72ef3e5bfbcf34efe6dec51c5f2ad2902e526b18f0ad30c6fb766785d6753528006ea882e26cbb697c529a6c303e081cdfa30a03bd8425f50c2a840cbb2bc6062b34a19c (encrypted)
Stealth Address
724cb156e96ffa71a8074f3e775db46934266385f3593816c1e4e8873cb15919
Commitment
f23f7af3dc1abfc477b84b6292573f0f3f7811b7838957b984079c7d001dc224
Range Proof
672 bytes (Bulletproof)
Memo
9101e5620a5025495f0b549034d67df2e0e0f081b880eceb22ff0d11202ab188dd3138a487bc6b26e2497adfda49783328984283d72f905ec3bb30a1260756a9f393a22d899cc5178af852b579f257987b7d805edfa23c9c6bbdb8910f8a7c5ec98745b5038e2495ae2d1f471206cc7f252077a1b053d51a2edc70a3cef08469 (encrypted)