# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
587ae8e6fcc64721e5afe360b994c6bf3ad71cf48bb1561dee9116c54afc5b5b
Pseudo Output
3c941d7754155859ef753a2c145113f9fa55a2eb9be906cfe7bec7a0b83ed103
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
46725bdf5c74b05145d0d06d8e9adb7a91a76a64147686abbe2d07a46c5d674d
Commitment
a6a672bfc6860619f710d729bc3e32d0579c00408eef9cec928482b62b264f02
Range Proof
672 bytes (Bulletproof)
Memo
fe2eb58349908c754d8d07f69c572809303260fa3f7c6c78ba3a8bbc22cb1e4b66bb0e6cf49797691eb22f1951c549e9ab6d5ea7b9eafb64df216bb9e707cf95b23e738a31db364464e66d7affa24ff3ebee533288a861c7e495177535ed56a25ae2a074b2d7ca854d992e7a2793d89c7072ae0df9e706abab58d3a5e3cba2ed (encrypted)
Stealth Address
969462f1cac01f579150bb81b5665f2b637ea026c36b5913271ca25c7c9f9d4d
Commitment
b412e9b356d9ee1868b1f43b92cac4aedd05a600f8534a87eddd410e61782751
Range Proof
672 bytes (Bulletproof)
Memo
b6f8f74e0f3ad99bca401d690441c874ae42730d8941a2d49c62280160654567709b66ecd226e537fde75bc7a964e1aa8490b3c3757dc407c91df36592eeabd14094b9ad8fee8b47fad7c24dfdf9d78953786eac73ae0c1be6869814d5e05e000465f04c6354d0d20716b7e9f44cb7a158c0f017e9e10ff66c915dc92b72e6c9 (encrypted)
Stealth Address
38e3a784061f7a20633268df88cbae31a462646318bcd3f3d13724d1d691912b
Commitment
4823340a2c8e99ec4b44ca6c77d5365f99b648b7a1fec104e504367da36a0148
Range Proof
672 bytes (Bulletproof)
Memo
7883238dfd01dfbc23b969fcabc042edc0e7fcd419bd829141b0cb53850b01cce593f54c0266ecab21758b1fa35f0a6c13d4618eb6bc38cf284078892be128905a7295ce7eaed6e78de07cc67716af534bddb42d0fab792646a7223347aa7074583485d85e31d9f5f81352b85b5afc24640678aacc89ed614b47da5e24411898 (encrypted)