# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
94599eb16fdb688fcd21a77ddab6ec192f9d4cbd1c2aaa47651da89401223612
Pseudo Output
56173d7144ce46f60f6469d5932f09940cdd521daa7aa4220225f6d30b1a4970
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
7a47de479f1fad7e10ea0c795f93b1dc5f86d32e379b80f958eef26affc5e20c
Commitment
e030d69931c19965b3b5db4e24ee959ad5cd970f0b60798473040a0be6c5980c
Range Proof
672 bytes (Bulletproof)
Memo
75d16a396c1f1dd81dc2254cbda028fc4b2824e952da1d867bf56ec6f78d1ab02f196002110ea992a69b51c3b59a2e8d578c9f43ebeed4adec4516c2bc9d0b302f80b8a1aab722cb33213cf9d0d906862be4a298bd203a47217843f0a9208a6da35edef880f92c8d4275ba70c1629d7eed367f4f6aa9c8fd843ecfa4163b2a5d (encrypted)
Stealth Address
b46fdc45a2137608f7343d52721aace0271b9e9e94e97d94c3c7675416069756
Commitment
5239cdfabab14e2325558941fe29bdab6eb666f9640a907a8073821c3a97d603
Range Proof
672 bytes (Bulletproof)
Memo
101c727402011b1facf5b088a67806a0ff8eea963ded41880612c26134c477e826acb63bab31e81e2c13e1a111b66ca6ea2e046f341668a446d2b079ee285efd886f7c9e23fc1c2ccb94880d3d6785138beb6f77a761eb2f320a4409da60ed7fdb8ef6868ae8dc80a4d16871fbdcc4c2c6bd05b533a372216d612bc282f49ec1 (encrypted)
Stealth Address
6ec1b1951195600c5371af39e03a1ddf5d7cdd43905a7da3434fd4be75edd23a
Commitment
30263cf03c6ba4556e77a0886ebbda1eed3f01fafdf45fb7f4ba452b2e81f14d
Range Proof
672 bytes (Bulletproof)
Memo
f2b5276cc583443b4a296b8acf8d1f5422e04aff14becf742642d9691507a00801c4f628a84ea338f658dd5cf544ad58343e3fa05800d845df283014183a23b7cde9839c9e21c15302e3a7ee90761da3d81555ee7a42cb48e913dca239af4e09abeddc910e096411f740e5d9e826b8c8e29a667bccfde68c0d37d70029681541 (encrypted)