# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
140bf1289faf50e3c5edc3ac9a8965c475474ae24f11435be7892867d85da536
Pseudo Output
04b8681b705cdf5a617a8722f52b93e6ba8e98d508bec39cb2f677547f08960f
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
b25d4c22f6532719811dddaf86c6fe301946c4fecb78fc9112ff1a600f696c6e
Commitment
cad8b96533cedae8347237a4cb0b368f52de73a7125455c2cf905c8be3d4c364
Range Proof
672 bytes (Bulletproof)
Memo
d3999e48ae8ffb10b5afb811372f9424b96d4459e82efbea7734c7b351762d07ae5f23682d66bfd91ea219546dded0a5f4126b269147e49364a433338970edbd27087540f09177989fdfdbc4dc7e98c07c4f5933d9a6591923bfef0e7afcf3fd4268891dad84fd09292ec388a28b33ad34a3d40d7bb2bfca3c68014a6d0d1519 (encrypted)
Stealth Address
dca3e4ea53390525e36f6d7180275f980baf98fbddef442ae8095c5fa30a5308
Commitment
963da84289d360a2fcb2432412c4f0e205514520c8b6ba26c61a6bb2b1377544
Range Proof
672 bytes (Bulletproof)
Memo
5c5e500a68030e353a1f0b8188de22b36516cd0caba53c8f5ae237ed2cc526164ced57be4636e50d640b512daff624dd2fa4d93e5eb8b9b1e0cabaf1e3fd3b744ad722d2814fb7fcd10f9afd0ec0223c535f83e748ea0e47f94754c80efaac38699fbae462d74660c771462b953eac7046cc542ea5b50e89edcc4feda443216b (encrypted)
Stealth Address
e4f8d125d1166e19f35be614c760484689fd64c0abb97014a30a438c47845b19
Commitment
12e16a720db38496cbe7e5700ed36a6d3f9c9b206c191cc1befdd79c5655b85c
Range Proof
672 bytes (Bulletproof)
Memo
c771698407893fcc863001e9b004ea36c37f2c759d4795ad757bb0a3d395843b672a8a2cf1c09ac4eb944a39b9f301e432979c93f4bb26a725070ddc8dfd7fa9a00b93bcee20fe67c905f11684bd50b772c5bcf6a5f96a698b7a8b0304103b8ecc4c1c2175445d9616d74ae5b7691070d2dac50ec3c251b6eb2b670c1410626b (encrypted)