# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
12d987338ee82b48164faace6f648aa54f566624f259daeb246bb0af62e0210f
Pseudo Output
30c164a400d2b3e895942cf12751a9a463d3d722263cd2c41d3ecd9c8f200a66
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
a46b76994f9cf82da9aaef1d0715e0742035e1f0eacc681980c76ee922528653
Commitment
7c8cba484f2c5de014831a5075fb2c907ac3f0b34c03ddeffba61f6e36a01c29
Range Proof
672 bytes (Bulletproof)
Memo
2fbc967751aac38b6e26eac94e52f081b885e4683e61606952c04b7fb2c2bb3634e4bc148de18f6f1e75b176044aef778951a48efe013927ab26bcf47ecd8fdc1c26c671cedfafc8638a7635e28b0cde1b614b8edb0a0b4399e7bf2aec858b34e24b5967da105d2cdbef44c02921c2a4e6ce4f35f8c98c5984e98d0846c1e30f (encrypted)
Stealth Address
be2eb10f8bc52f8200f8c78f37b3b876999ed69673f2c8ca345dc1e1acd49c6a
Commitment
7a80838c2800100e866916c06b74a3a6e26af453f3d82fa1e119c85b4979084f
Range Proof
672 bytes (Bulletproof)
Memo
7ea26a4bb60c2c17d3bec0cf077fa09f9a763932257145cd809c672950e3c5a6b0644c2d6e74db85fc28112a5843fd9d0ab63f2d3830083ce157dcbbe32cb895c047a0949b6503ad101844c3c6abc8f4bfd1ba795e08eb201af5dc4dab6d41db315b04920c98a24cc25dd775ae6d1be0e80cae420d3b6e53aace56d188a6b068 (encrypted)
Stealth Address
fcbc1dae930b5d685b77d99f2bf7e463db28fe2e728a23e31166aae698294e53
Commitment
18c41fb22cda732fd9ba6428fcd73d21096ba2fd4d9822b4fa48551255d0d630
Range Proof
672 bytes (Bulletproof)
Memo
4912e5f8e7b39da1847bae5f3df8756487fc6057aa5a6f1eb271d91cc47bd3b867e8bd8758cdb35e6b5ef3836044e71568fa52898503eb40060079f5142e688c39d25894669cbcae4f580baba0e00f2a26c1bccdd405a6933606c4f4a4d16c19b4911c38b1f99aa1b20cbbe514da6c8ad81a20eeea1902f97d80efa8f60af776 (encrypted)