# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
8258b1543822b018faf03dc12247399ec1aff42e30ab18dc648ed0c7f0224316
Pseudo Output
34c637e3e9bcb3aea7b7b9cde7398e14b2cdbacfa1411054072fb2cee160a765
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
d2a7cd2f49802be666a8f61ad8a2f9df7ab2aadf1a4b221159e8a7c63e50513c
Commitment
9ee99051b5208b7e88175384636b2398b61caebe94c3f9f3471e493a1d79f632
Range Proof
672 bytes (Bulletproof)
Memo
6f91a48d73a306a52e7323d737b464d4c03b83f3c50f552c3bbf9ecc97f0fdfb5d95a30596ffe8eb0a3b4e7070e8f7a8e9b11a63a1aea79c2e37dff835517b4c8b8fb69322f11fc0ee9bac136b506e29e92c581908e56c03afaf2b00ce5b3062e458ce3aafb18739ad79882d76bce5af85405688bc858dd8c6f79a6907d31dfe (encrypted)
Stealth Address
fa00d6d4e44629461f276e3cc5a453f4fcfdfc28d82e847ce09da29918267261
Commitment
2659c481de860d51a5535e5d864e43be3cb8cbf90f7124fa21595d767388da1f
Range Proof
672 bytes (Bulletproof)
Memo
d16157323ec014f1486d0ea569b0960821d238af211b5e2a55a565645f5982143b002dd18a316945a92c0904232d7840531b22980de268733b40f54a38c2c22f524287cb2ad6ccbab1a87bf06113cd5989cc96824b7fc8a9c176785bcca92dc881fe333412b7eddb61c35e0ec623498e33fbc4ea1390dcceb424f2f2d365bfad (encrypted)
Stealth Address
aaed53e4b61dd8ee3248bbe35bf673fef802f9968ca38d39988a5559341ed13d
Commitment
b0e25a2aa1e49470925cca391396431acdb04dfb9f63b1ff7fbc38fe6b5ffc1c
Range Proof
672 bytes (Bulletproof)
Memo
e2ed0fa1157e9794f23d4a1152767ec8bb66dc739e6a4c6ae186c3fc29b734fd284fa7cbc7bd1bdc3ada9d14e03697c9ee52ceafe9ee9d12bf255249011229cca933e040e2cdca4a607293dd1c3064f06e664acd481640964ae80eadb4b8c82601e37574da3d6ed3cc427d7b954b3a93ec8950e787d626a4e50f33612a33ff71 (encrypted)