# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
d62385c191b4ea0380f820f1be624f8cd7e0f6f0804560be5f0b7943f407493a
Pseudo Output
4e352162831370aed61e82e99d615d52c2ef88e6eb92658acd97d499afb92e50
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
26fe5d1d5500289f48feb9175ae7afc45f3f4828bacbd80d278fe38b9f847e52
Commitment
847ebc62d68eabcc8728721c6a9204f9f0ea4e786331b85cf1cf7b49cf56835e
Range Proof
672 bytes (Bulletproof)
Memo
1dc1711ff0a461fb86412bd6d2bb6fc833667793b8903e009ee5f0eced3d60e7b5d3852f7ec35e92680f8dc8dcb910cd75a92865fd12360651df28e5b9af4570a2e3c0fd462f2622954de94b52123c3c8d1b5fdca6e67bd0f29f40f79f465643d42ff3cd2ab231e6002760e7cf5dd21b60424941af3b655f0c767c4817b7e1a8 (encrypted)
Stealth Address
dc29b27fea7b1b1c2e99866ab2131600306d2e8a0397a0df97dd7248ab6bb735
Commitment
8e76e050688b51d728614509f32436a02ebf5341498120911790cc79690ea359
Range Proof
672 bytes (Bulletproof)
Memo
fedb279f3623e3a46f57afe63a43f214f46ac52add4dfb90e50641c6ed88c8b27f00cc88737d134e7c56805d4e6e051812554aa76ec3f1bfa3ea1b20a2fcb944f76e2d3e13d50900d274a463dc7952582f9a9ab524df5425c87ce3ab17ad4b13e47c8cbcd5ce2ba36193455acd0ec43a49dfe0a829866a4558c6b230a526cc25 (encrypted)
Stealth Address
1c7f6c3f47ef5d516f33f925ebebee8f471921135f39565f1baa61b184b22859
Commitment
1a54de35ffa1f7c6de7997f7c4ca311ca85030d380db30e287f46950efa57e50
Range Proof
672 bytes (Bulletproof)
Memo
a532e2e60229c61e896373715a578e01e720eb916532f9ed8c72ebb27734ba798f9df08e3eb5e42858064c6ab3351049d6a164f59ed7f45a1c2e1da330f4e25c683e3fd9f8f31e45b723b4a068809cbf207c00244cced8ab6a2ec7ae15bc75bb0c0f9544047cf18e4ce60a552943802900c56b449f5f7228f14970e15557a91b (encrypted)