# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
de083ccfc6d577e13e2749ac178c26f9b1286d0ca48598acb834ddff0c15336c
Pseudo Output
346a8acfe1d80a2dd2cb920f3fc287232ba478e85bd9c11231d689ced824400f
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
48ce6dc80c537a88698f5e5ccdb06c94fde495bf6b09db25be54d59a2bdcc65a
Commitment
de4d1c5b095c3dad16c4fa58fd746c299a77b20066155f6280064b04e71fa93b
Range Proof
672 bytes (Bulletproof)
Memo
71ed120c598ce3340b6a2cf0339b54db9767a067b7697cff6032b137e22baf7e342ca7866845c812683fe01a8dcb1a8d6ebdea9ca4465d8c99e7837e12f148ea6e15c24a7ffd24649be5b43e90e1d705de6dbd1d64b1711a92fc3e53fd9f120cda2b141a978111835f23389307e6020319cc4275469804b5f122d015eb1a0cb8 (encrypted)
Stealth Address
86f0b9afda1b561cb246413f9cf7a4bcdc1ffd6881a828ed9ad77f382e2d2d77
Commitment
d2070b98937af9346819b34917dd3d9810173475a6a3c425169b1b3d5db37e56
Range Proof
672 bytes (Bulletproof)
Memo
97ea3e2989e2f85e0f18dff48c6de74f43db2677d8a78575f3be087f33fbf34839dbffa881582e4db22d6d6cf3a18053badd6a45e9d2428b0fe2ed8caa105c37c35bf5214a14478c09c62b16edb9638a4fb88009b2deeabf8e153ebfa62af72c2b216bdb6d6dcebcbd1ce24e56898a59194cb63593e34976a75e143b613a6e26 (encrypted)
Stealth Address
ecb06cb469c1a2bdf0e74e3bddbdebfada8fb3a0bdf6ac263a74701546b85b2d
Commitment
d803d6b9e65dddba74feaf8150a24b391a416e94b6117bc2f1af71a8b5aa653a
Range Proof
672 bytes (Bulletproof)
Memo
63ef3fa5b334f712f013d8e282a82086bf02ccb68b41e03c573e3ee7d2d7be005f5b62c4714eae3095869a65a992dae8edcd5504012e2ad45ba5cb9b4cbe049be44e7941fa288fb71b8f9b7f705ec0b8ca0a69b135850b4fd358441830404664c0b097cd8832804e27ffd703fe84550abf9a9730bd50857c7e708aa3e1830c5f (encrypted)