# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
4ea008765ab11fb51911071a40494e03272f27b914f7a511936ceeac72697d6d
Pseudo Output
32abbe27851c595c0bf4033cdbd766c119f84d98cb3a2d9f4583989920354c3b
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
4e495e440e6d9ff9b3ad2c8f2f2d4c4c5ab9f6c9fd6177f37ff4ee92f2d2d664
Commitment
dc8ea26220fa10ede9da2410192a252a937e2a178d2b77d7f7000b8072142c78
Range Proof
672 bytes (Bulletproof)
Memo
532f6024358fb66cae11db8bdeb189642a589c1cc40f6fe1608892b60cc7580cb7edeb12b0988e3f371b24ee91fb0b8de3ff3d7f828ce1057ab953b9a40641de8b6aa62fadd804e5c9f704655bebbfd93a9f411f2ae8e704887f173a7c9fc7f882ef466312a761ba99cc06f6a2687c239f6db770c53344e2b6ccee7eb5432caa (encrypted)
Stealth Address
cc97b045dfc221aeb6700b87085fc485daa0a1e1c18491eaf38ec72ce8400241
Commitment
f8132c1d43ea280f1a3c6a5ae77d4be6ed4e0ff6b7b3d7ea14fceabb6193017d
Range Proof
672 bytes (Bulletproof)
Memo
53dc78856184adb370f74d7c85460c57ad1659b65944429b6a05259dd56975eaf0294780aba19aadb4edd2cd9a4db1deff02491ba282c723b66e0b6973c74bb1db24699b1a231520076a9de74bf74a3deda9a19ddc666d2bbaa026c0be27b400a543b033d1f3fb7def1d1b52e5d2f1bbb587a1ebdaba2fd9fdce0110ff9e3a30 (encrypted)
Stealth Address
04d2dc6665321cd16eb7d7284f1a2e21fa623401cbc3a2ec3d084e5a259eec35
Commitment
ee5cc03b36379974d33aad7391430567cac6569dddbeb0cb8e0f595b69024f5b
Range Proof
672 bytes (Bulletproof)
Memo
022e312a18abc0ceee8b41ebef55467e172c3e1906f2ecb03a558acc0ccdd2e9856f112e53c60ad9b8a87742635834a8df1ac7949dc7da1bb923270a48d76db2df635e60c8b7d7e81bbbcfb5df5e800abdd0b8c5b56dc37ced05a8d2e99398349ebecda1e621728d79b8ca05af8b9a5f9149be38d4291c88d81ed76aa0c97647 (encrypted)