# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
1854f8b42c376a6de6a5758662406e9d955ac3f9468815a83fed8ca1d9c5e10e
Pseudo Output
1ef087887e0a666ec40836c224a7acb73e3ee00b374e19dd83e5bed3a19ae274
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
4465c1ddc34f33ad80fd6c2e5014cdd480ebb9b6c1b3bd3b5ed51872dc63a70c
Commitment
eae72966c0070848fa234e873108ca705fa000b2fa280819d5b929a8d6644f16
Range Proof
672 bytes (Bulletproof)
Memo
9e9a0b93b15de5ccd76005bcf144ae29780312241ad80ffbe570bae34470ab8cd0e887b0470c8ca9ababe6c1c1d778869d61e23e2d66723d12df0846f8cf5125f1e080434904356b5316b7e42a6c3325f27457e8a2c8cd212b20eea0cddcb655d415c8c94ae957c5a41d650ead188ae6eaf737822a89e6614ba509d27eb1794b (encrypted)
Stealth Address
c8e9e8dd8b02b8d87dfdd0752f346bdf86f14aa6dbcccc5ade395557dc084255
Commitment
4a9e2f3e4a7ea5c0c4087adf86cf66687ba3d982f035ecbddf8ca573607f1f1a
Range Proof
672 bytes (Bulletproof)
Memo
231dcfd605ec17108d15593eb4bd907f3e385064acb9aae320f25effdef703ad494d10a2e869ae63f13ad47d21ec5ce23d31f186857c17f421de8302a182ce28293d289268eec1df9ef853982d1d653b97b2ba8f195928dd7b6cc83ca60e3f921059ee9c68db172de769b0e8c968664d0a0ac119ca46fc7bff55e52f6fa981cc (encrypted)
Stealth Address
a60175f367c36d9d8e507d0a5ace81ff0756fcf75a174ab8056f49819b829d66
Commitment
2c5db9a01de0382e126041899bb7f5ecf0e1bcc1e988b654cf4eb266366e1a2c
Range Proof
672 bytes (Bulletproof)
Memo
71df168f6173974b73e3ed0433bb476cb9a7a1c6cc8fa301cb5099804c15f186fb85674003ad1cd1292881c5e8a08e78a2803fbc5f55fbb52929129fdb14220cc379b0e0f1847d0a1d7b534e371ca77e19440911c69fb58dd2d01d90ed853b8f02d6b338d382156156fcd0e85f2a095687bc1e5d4cfcbfb2da4590c683382500 (encrypted)