# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
ce0f1ac7f9a069f6d91b0538e47116889db5e1b7152dc5a9e7150042f7725413
Pseudo Output
dceff3f1a6bce732d14a3fd485db894f8989ac56e660be03fde9a496956baa5b
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
d4e277f687cd379e67abc1eca9b6968f232cd5267d518d9b5279fa270ae55523
Commitment
0603feb621139fb89c4a54042379ebe0ba77633ef3073354672448c335ce3f68
Range Proof
672 bytes (Bulletproof)
Memo
8563911962e7d02740c257ae04f7dd9c03c5319b0f30f104a16356eb6a8babb3657ede445cb720372ab9da47eb9d4e39e76b66785a3f9385990d79971cc1c4ea3c35c92165fb247e2903b0136581c37064cf593d9aff57ff6d262e8db8cce93c44bb392d6a3ff5dad03e8d6acf8cf42feb9710156c8e271e4c5a5bee393f5241 (encrypted)
Stealth Address
520a848a486031a7fc1b73ab123e2a4cf7e57b34c623fa6af17e4babf311a868
Commitment
58665d23eeda47693f0a010073c1efccf1830b875061979cd221ac8dbd03ca49
Range Proof
672 bytes (Bulletproof)
Memo
555a83564323a1f92f3b8dbab0634b96c5b27dee7eb38d9e00b203aad6e9650df2e43633fd8c0896796b49141db0e70b2c0239c9c0384f630255ce2d65a55ef5c3ef0c9d77a6843ad5de8661c346cf250ba558ec63b9dcf7bec9f9fad9712ef5e812ef920cacd57b2df5f37ff78e45337fa7fc782b74569aa8b6ab59a62c7e3c (encrypted)
Stealth Address
6204f5ba46d5d1b66be3be767a92a9727769d8c5f92783ecd42bba554c584e75
Commitment
6c5ce93cc616b4bb44d42e6220cd452d86068eb6c60147259c2c52f64abeba00
Range Proof
672 bytes (Bulletproof)
Memo
9acef10e03d3cfecb256f5a2ca8b67544ce4446423477691cefb5581d018aed99a26dff1232a2b023dfb3c4ce9cb3571b06f647d13653ba2d70644deb8fec2862c3abc79ae8b084b940b5289c7e756ab4d1f76260bf06c806aa49838232901bf4f421143fcb43768f90afe61fdf43a9432c3f74c117e17aca3e4bcd8f762eb20 (encrypted)