# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
46ae64741fca75841d9e5bf2f5f4eac63ab342a8402216118cb70706d4cafd72
Pseudo Output
2e453fe4113a5afa0f8a587addbfd68352c4b6f9e97270d2ecf1c6b536e90370
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
c07847104ee47f5cf78b9d273464b4ca0e11ba0df48f834c73af5f587a1ce673
Commitment
c0b9b4d3e2347276c9386ea637077c5c3a121ca4b08af3a4591ee2b9f6c51021
Range Proof
672 bytes (Bulletproof)
Memo
da11530107f347a775ec629f7f4db223f6e96cddde9c98154626d820fc7627ab92dfee467f05ef21a6835e92f40438ef98abc40a8ab87831abe482082c1f419c1b009febf9f6aee67ac6ba299f8b2eff641806dd070eaa549e6a67c67e74c54abe28ed4b02b1df7fd3973535369be49190e1681b3e5f4e810a904f28db6af7a2 (encrypted)
Stealth Address
06a59564c8835726b5baa7ea28eb3e1c983b5402d8c2877cf8d0fa95dde6fa7f
Commitment
58bc2b701439b2bc8f245fa8f5062ad606642d73299b36694f8d213a2329a51c
Range Proof
672 bytes (Bulletproof)
Memo
001b13bad58c8c245e5eae3c1ca8a1522d3cbbe7eddec8f8334d1a2bbca0b7fb8f80bebdd3adc3e3061a122be7819057c0e01e6852286c0337783246ada93f479eceb856445b710ee4d65b410c539b9fed807fe806d78b4ed792b2b91d4ad733edc4387b00213984476b0d568bb497ff8b4f1ea9c089990e4597c1dd6125267d (encrypted)