# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
f8524f463c4abab7d25d717c594baf66e07084772eea55473f39b29a5e9b020b
Pseudo Output
42ebe98fcd4b66f31b3713af37230a201997a31d73ec1eadf23314ac6433e966
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
962d4fd84ef09f53ae534c4d7def60ed1bfaf70f0a5f9d96b69c3c2f4fc79074
Commitment
d638e2c2a2efcf46158e96b912aa1ea3246abf4bddd42bf8d7f1cc59d1f8fc7e
Range Proof
672 bytes (Bulletproof)
Memo
e19cb8c2ab048b6460ac1ec64784038f8eeb51e87a4d83614a3b98ef9dc9105a673175616cb22e14316263d9f19f74d2d5c05471dbcdb49f9d571a81731a464549ece83d8afde15531b5fc88b5f309c9f11a9aa7e690a685f4f59984510cfe3cad237b121d20d2fc87840d7e820ad2616eed74dd670198e85ddc1bedf726820b (encrypted)
Stealth Address
ea737c8b9aa74324285d5676f0cbb07d953988744061e898347e9661af3df912
Commitment
ba8790413cc02eda0c3eb0d4880e8e1b321ff9bfbc38866eec6ff5f7893d034b
Range Proof
672 bytes (Bulletproof)
Memo
6bcdcfff1c1a61e2398672c84d61dedac1a5b19f7c9a2d4d7b0ef2c98fd8ea36d932e8d66918344ec657bd6837e2a475838961ad7d8947259c19481522852f5b7473491768b496a7ebed4f338eeb40ed35f8ec1f3a21025e632b3e41d0efcd0de227b7606c5cb674881093358e89bea53e2eee20b1dd8daa0f6dfa10a23cb617 (encrypted)
Stealth Address
80b73b1017ad896c71cb9450aad5b2b630b71393b057b7ff0d3e9dd4bd753917
Commitment
902207cf840029251908edb240578eaf62572ecddcb75b73be7baa3610376f6e
Range Proof
672 bytes (Bulletproof)
Memo
4de7d5a97ff909146678d9c75f00101e3b97a02d7cbb4855990b1cd20b041e9970228c1ebb37b447d36b956f54359590d8e66b56c92636c882af89d27c8899af64713f6cf444745c60f07bd05777b0c2df6040668f57f19e5bc0f14d8e34dfb6cf48def469aa18cf0f5d963a33d0ec7307f13fd943753da6283100ad00c24b90 (encrypted)