# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
4e35915beb925e36bd58a02545091f6650824a3ce328ed9e5e708b8c51407c61
Pseudo Output
88fa793076c0bfcbfa149668cf47ad02070988e37532cf6160461c9b5d9f394b
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
661a07a38fc38f3a74afa395e241bb3b2c4ac66f91514d6d0e2b8debb3ef2673
Commitment
92853ab3abf02a2b5e814e01280c1dd5a6900ae5444ebdf3bf3677e1ee18527b
Range Proof
672 bytes (Bulletproof)
Memo
4c2206a1fe26a550f6f1ad1ae90e8b89bf862f58e3ef2748538ba0c4f78a875043e2448b373bc3c3bcd8501a0ad2deed5e223c05f119938c980484e1f659a10d1a5adb22ab90bb363e1c40f3d74d253a0a9041f747e8db7e6c1dfb5ca7634e321899475aa217f220056a26415d680da524b87cf9604f3ab2f2330142f8d4d983 (encrypted)
Stealth Address
00afc75a34ca56e13e8ab67fb72def446639d0228153ba3c3c2d612941810b24
Commitment
4ee0bb6941731dd6b3b106a654caf79761de32292e4e467a91caf01cc5ee7b30
Range Proof
672 bytes (Bulletproof)
Memo
7f91524363dd57f662ad9d6ab1922cab25c9302bf2b5dcffd9da383e253d8d6b22454eab7570b1647e05b54e9476309135347a76a180bb7bac78ba45b9ff4fc307dd0dcaf187ddae123d618ee4c5967cdaa9a0ebf2af7bd5cbcd260a342778b4bd31e3aa9050a38885ebc62330b32b0d7c727dac84b3c829cb9c447f6de0f836 (encrypted)
Stealth Address
800ed9461be97a5ea0eea148304ca13377cf821764f49a0fee8b9c972a78c24d
Commitment
125277e89770f224aa70a6716e83cfebcf7725b1425ec7cef85def8761ebb506
Range Proof
672 bytes (Bulletproof)
Memo
70e404201e16ef95e4aad7b693f99bd2b5add842e74cf9e790b010e77232c7e6e44dfbcd8c35c21e804030c7101e7f476ffbd06dfe4a39cd729795c166f24b6b3dfa5ef46868a617922139f09f51ebaf64caf43fbbeda92c1e9a38e1d1e484527fb33ba1006fe665d7bdd6569f0dbb24d561e21391fedba2cd67433f0c75edbf (encrypted)