# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
a6967bcf9670cbfc802a299ff45e6e847bfd6cf881f8e29e1fb8d479303e6901
Pseudo Output
7af336f35d8ee2a48cbf21d546c8989a4522dfa4de415674b1067f04c3bca770
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
ced5397df9f454f06ffbffdceb612343f145e0e64e699853c3e3417e7a73831f
Commitment
d0ae580c0b5278941eeb5750d0c86a2451578437d0e8349dd7036ac256d3dc04
Range Proof
672 bytes (Bulletproof)
Memo
9221b6e78bf123ba0ac27947dd82498a8b2b116c325569125ff2457f1bfbdb7d827c103bdcad4f858b0152b47e21a9424a60f148bef721ddc5c44c143c08b431ab4ea43c81859a15c64df0153de56fe0cb40d981f92e77ebb6ff997a8a86a142ffc5d991a8ec166999be20fb7c14c76b10d3fd5f5cfb23d202d41594e42c5fa5 (encrypted)
Stealth Address
7c7ce650e94222716bb79f8d2f76d47e58aef61dcd6995fd618dc5abc1406c6f
Commitment
b498adda8ce9fccabd5d65a2a97d2bd85d4be9f18ffc158bdfd797827399eb71
Range Proof
672 bytes (Bulletproof)
Memo
57342d71b7b31caf6c704dfcc8d0680cf97b59cfbdac446ee1ded4b060a85798939ad428ae6a233d8c0db598229628cc5cb0761af79d7b38b54889ced03906439ae3f4e14cc78d01009c17c93654484292a230e421890e4bbc18aa1e65c1b29708a8bf7b276c8cc0b1f52be977178c49db4ec6254446aaf9f5b38c870b18752d (encrypted)
Stealth Address
020ad0284b7503361807c46949f9e22ff83a65541ccf3c465bfcb1cc562e8661
Commitment
2408b71590c3485bd7114ad451af4030735d7e6fe74aa5a95aabe65a35c67632
Range Proof
672 bytes (Bulletproof)
Memo
780e58ff9c96edcaec9df024a9fb1be0321b730ddde4878013b126c0572402b7e677f06ac4b56d082d624092cbab1a2c3a74edf4d2434e2b598e180917c665f86b5c02f3b1f2d3013a95b2c5daa4505f78ad52841336cc77aeb146472b6010a198312d93e52f062256b96212688917a3432ade37825f600ed63bb3fd8e3f3ce5 (encrypted)