# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
d21ac40d16f634290680d2a726db22ccce3cf8e13c42505a50c6f74a47846463
Pseudo Output
541729775ae96e70e6d16dc4cda892556bc2e7905202b2a82152fd7798ebff10
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
d0c5ec401cc6e226e24c14b8059795e54f3bcbed483b5b53ca16b60bec972472
Commitment
be3b7b798782de99567e6a4b0efe06e2f91491263949ab0a1778786aa185650e
Range Proof
672 bytes (Bulletproof)
Memo
5ff7dd6d389f6bebeb8224d4d85d3deed45719f46628ba38392ffee010970a3d626d2174fbfc4fb94c1164d29551bc045c8af41e1f2e5f0c5a5fa03baee1c58c3e36eb95655ec299e77c1399409fc39ffca775056c049a3c9b3bad5b6a6948425c71cdbf650cf8200141c71ff4a2b1ee816fac134d2f33a477ecd16fb4e9cc78 (encrypted)
Stealth Address
8a4c4079d05bf2afac4ad6c39b6fbb3e5e007a65473e425614b3671d10afca38
Commitment
b073c0cf890cdd2ea997ffd2b6751630cc39feb617de868cbd32178fb6e4f53e
Range Proof
672 bytes (Bulletproof)
Memo
0e9fe78de6dca51748efe83b828f4930c7243f11785cf3d505d78acb3be6be5087646b4413b02b58f771d3e7d5e0046e408c7b8c183abf1d73e5fec6a8ab5bffff644f2c4c4dcc18cf5c3e2fb4574ab15c1ca90befbbb489e2f8520b8a7e24dd0679a8a8c693c0af1a1c1d19e0211f838a17ec99736e6a899a4c18e018f80818 (encrypted)
Stealth Address
d07c2a5ac7662e50e1167c51a59fc597cac9cebfa2c66359da475084e8192579
Commitment
74e250567b35e0167c12eef2831f747bde9b1f9222eb7eb31bad2b4cb0ffa840
Range Proof
672 bytes (Bulletproof)
Memo
4870321c79b20d1b7c644baa39b646264e5ed2cf65ffdf46f38cb50b0b87c5e8045d440ced819edd3cdf4930c8d8015c82f430055af179fe65ab049f34a6a77297f110c230aa802b7a50ab33aa3870769e915696500468c7fc3242a6352330ced2b5548dcb239809247e0d2f6ffcdc7f644dc42379877ef56093c2b84115f650 (encrypted)