# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
4826c34bd019b0edfcc4db33f4e8c5d6ec880b4f2cdd261b6771db1eb8c02042
Pseudo Output
72fa3ed4d579054d52650f693f6585d8187c18997b4976427bdf67ef4b3c9912
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
5608fd94fcba919363d6ba5933a9f15ffd7f2d2ca9fa3a6819b4f152e65ed519
Commitment
5ce94b32785ef84a6dad98c616927d851639c55bd162e1724f0df2ec2e141a65
Range Proof
672 bytes (Bulletproof)
Memo
7f232b37337bef8f3604a7c54bf829a03f60467584b46dfda7e6f0c1e983ec3fdd27088746ba56777e2da792e0a5459c3aa5a9134fdef7b2c1b913c4d1b1b97d9fb1766a0361c4f7315e6fc994152a0b850ccaca765f9067ad6101aad187f765d018f761be67bf9b249a94ded0af2eaed69a1497ef8ee2d9046bd90270e90b97 (encrypted)
Stealth Address
7a25db2e8286d33db43def09ca08fc825cc05226e86b0aadc892f758f5028503
Commitment
805a91248e9c5bc376e7b9cd116bc7e48765cd32ea713a57c69e8e49ed51e42b
Range Proof
672 bytes (Bulletproof)
Memo
5f80f7f8234a22a531a0ed56c42753a6f1c9bd3e3ed4a3b68b484e6119c7a9b4f38e69b4e7840a4bdc0680e6263d4d04021637b01f0b7e11414fd22558862745132553143c13f2374a2ca823adb37362b58fc1fde42aba79c528bd9c2b545dbe62517049cb294f269a8b8807af18fd5e754de488dab08440b146ce09698e1c43 (encrypted)
Stealth Address
22a2a118701afdb40bb580f6b4092afbe82aaebffad01b498748ad85b65f9e1b
Commitment
287cf122198a2a280344271e983ff2f898f8988bcb964cf568dd992ea2464c71
Range Proof
672 bytes (Bulletproof)
Memo
2ba5c86f23d195c6ce340c39f2e0aef52a93e94f6ae61e6b2b9103e675a0f6099af6a1072e887f93aa3889581e917d3605142f9f0b5b7ffae7bb38c32de873a9dcba2b14ce6671dbd3da8ee359fe8efe97bed93d1d4a675305e48d586c9eed724dd7911b64645eafa5919fbdb17b98ba1b277ec7eec7dda632921eb3e40b5e46 (encrypted)