# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
f4ac50beab2f6b47070f8e287cb462fd44e619c3df6e67eec8a1cc9d4735a03b
Pseudo Output
209d7670e457de84a6aa6a48b12c4522cc53592e311ed7b26f4fc2b4335c380b
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
4e3ae7b7855395896f39a4b73eaacfc4d5209385448b06bff0587f534c9f1a23
Commitment
aa2a463e992982b37ab0346e5a24aa85fd5fda5bfa9bd9ef437763b779e9597b
Range Proof
672 bytes (Bulletproof)
Memo
3f81ffcbde883b22fbcefffa18d922a01d98e487995d5902ca1e72cc744bee8721b53ab2d202c456c1fc19aa304506f2b5584a6d405c94c92f5a9ea8b123b332aa93a8a53d4b499ca0a9241ae80f8d71c57a2967554e0e40fa02e87c80f78eb40088a12883974261ecc3a9dbe2d31e45f3a4ff7efcc3f21818c03ffd43853315 (encrypted)
Stealth Address
1043b6d1af215e7da348e2f586d3c179c4507303b79ae695b9aabb9b4c285d25
Commitment
943009396c348e79c3b010bb1b59c0b93c9e20a776d31bd02983f43b8ed7ac6c
Range Proof
672 bytes (Bulletproof)
Memo
05d6cb5ea5a05f54aca5227785774f734847d59952a2e9f2adbefec6de1ac4eb2e022ac78f1e8a9baacf11d45ade6a371d19f15ebb1031fd265b68ed5222f9f4a8c45517144853f9bd170ee83e4790d8dbe2da00e55b5c7833e3474ca09a73ab7923a81d0f9ac6b39ba4e103b202015ed35bef3877ce45eeefcc300701acfc21 (encrypted)
Stealth Address
eec0565efb9db835f5cf24861c20fa3501cf56179daca13e02f403d77afc0756
Commitment
609695d28ffd4e9ad554ca9519a190dd0101dcf627c2ddc9c9cbc2543bd7d31f
Range Proof
672 bytes (Bulletproof)
Memo
2e0058ca72bd0217ab41855e9e7ec98a8afd4532743a9901ed083ca37dc7419baf6ca85ffc1debbd1694ced9889d2b856222b22611a447be4f03707cfa2fb2cc8098c8df8b65ecfa5ce47972eded7b559e9754f1e5a7be3eea74cedbf51d3cb870824f4c8017658f9b06e1f4530f7d9a9592b807f846f8de20ca73608d0cd7db (encrypted)