# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
2a9214266769ddac4e8ec61803028d30a64e63538b60d77ad8287651071c0168
Pseudo Output
34ebd3c2975d9eb71e41c559a1cbf665fe1002c93af82c82dc0882ff4490d023
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
16777505e5082ea0549a7963052f1a5e347ca82bdfe2f63106e1d3ef045d0b4b
Commitment
6c5773ddf6bfa97b712ad10fdc0da46e7e1d6e26904c28636dbc623f24441b18
Range Proof
672 bytes (Bulletproof)
Memo
76c0bb0332881236c759f474232419afd5e4f3afca723f4b59b275dc28cd2d7bac89ab0fd116e23acbf2f74c99bf828817b577d9890501ac12dde65528eed027d24212fb0deb085ce4ecb3dced25c800a5480b022359f0d436592428ee61cbc543d7e7c56351109a5bb468e99a939020bd3c2a85028d4703686b298feec8d2d3 (encrypted)
Stealth Address
fe1cd269c4d51e45718267e97e72f14d1556bd4d6db81ae1f83588681ef3c613
Commitment
6ea6378ca9dfadb8efa33d4ad0e52173da40b7f1f7e3322c8193d3d0a141c32a
Range Proof
672 bytes (Bulletproof)
Memo
9334696e6ff0fdf4a7c7c4e1739673b022352e96b536a905f55a73b974b9bfa255e69188e0931c44a15bc42d0f3840e29aff760b67fae6397f3e3482424a95c483a861748c721c8ab74655c6c90f3d5eb7b59866a3985f1cb74b33fa0d3ac1fc351d3521438a36af02d05dfdcc6ffa6a166d14f758dd3d003edd88a444a1a774 (encrypted)
Stealth Address
9c0cd1eb0fa2b2313a4c3330ede0d0c1ee9c8dc12f273f4a5cebd0c16133d650
Commitment
b2eac447387c8d8ae8a1ca34e0b7b6b85c760400285bb5320b02ef56c3cd2620
Range Proof
672 bytes (Bulletproof)
Memo
6ee01564c71b08e2257267df958a8f2eabdea60e701e2150f411662a68bab2d4a66b9191d699620e7a46a7d92daea8cd649ca12c57292fda2cd9f67a61be814beed55ab9a5c9be908565ffab180b91b958a58e71459324576d3166486d70e84f270bb1871bca847b3fed1d70ff9d864f7f72c7b3bf28417d8d58b1634ec24d21 (encrypted)