# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
846e549d63aac14b470da956c84fcee5e68669ba70cd5916ebbfbb756f9b152e
Pseudo Output
c8e8f19c0ae81f605d72c88e9adf7a2d9bfc94075752c9b9a130d7d1815b864b
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
468c0f7ccb5170d78c56491e19336485061c3be206d0f5f7309b4e930fd43603
Commitment
06d38416aec1c4b2f4b52dae9d2af7f1e4bfb462289af5f402d57229bae73e21
Range Proof
672 bytes (Bulletproof)
Memo
df9f87847e1a21c342aa4ae5fac07b6cf6757a0176a14bb33075680b17dcd86df68f56308a7f7bd3bc7ffcd0077ca976afe501ff5fd71b08d6f1d3da79bf4767ce89023e6bf93616aab3effad0e0779da7e43038daf210def2d0e4d0ca75fd1e42db9a925fb93cdb24dbc77be99c5dec940690efd3e97ad25d697328dcbedc66 (encrypted)
Stealth Address
54cf57592faaaffb8679d72e500d38c85942a37f1e07a1b0b5298d25d9449c6f
Commitment
366ed0539e1983a12ac53bcd093ca01f56194c953de790ac78c2a6e0d74ba836
Range Proof
672 bytes (Bulletproof)
Memo
78e27465d26b26e88e85f2b1bdfdf9b969013b124a90f9670415af23c586d589b836c06633219478b3ada07487b5d4668d9e287a32f42a18ab58888bd5da52c55a8fabf34c5b1c6c4c80a9a176db10bbd79e9a78d22053f08ab7510f4b288bccc879eab5ad05563ffe837a55c2c0625e8a6eb7bfb891a3ef8963d887bb02025f (encrypted)
Stealth Address
4c126c33549966372d0d537e5590740c9eedddeff3ddcea9d2b95ccf055e2325
Commitment
462e4cf4e724b7b09b3726886bdd3edfe47e7e1ab63ced9f1c39843b18a88921
Range Proof
672 bytes (Bulletproof)
Memo
99cc7de6f0a944199bda98839afc305dbe1f4305afc4a52d5a129a1b6d7c15c70686c3c9bb77a7c28602070199e8ac9985a6006f87ef14cafec63b8ad407668bb7cffa263784a49d9d4c57e6d51e600f162b5dd621e19e45a8c831300973197a2e9060e4e2b531a663d738521474913ed28fc2842a7fb1f20ff060796f3026b8 (encrypted)