# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
5028964bab27d920e77b69b15f903710f329e64bfe39036ebbb81b0c5f4a9e56
Pseudo Output
228cfe576c37add98b365067b229686188120e4beeeb0c9a746bf30d75a89572
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
4caa3f2970bfdf30f6df70b4af8ba6f9a726fbc74b01efed564594265220680e
Commitment
bcc391d351ccd3dadcf0a1d57ed14a292db1396318270acedf43ab1e30e62948
Range Proof
672 bytes (Bulletproof)
Memo
e167a6e24b281105e5a0abadde324cc338fca3c2456b5c64697d2813f92d0d28046059afa9104eb9db8adc45efcbdebb91e0f07efba0663bf8aae48df9f516bfb841c0ae22dab6d03dd4ba0a22da60f017bc84334498cbf5201ad8d5a319952ce022f151261988180472fb2c2c3fa970bf0b8b4637f31a9cd319d84bed242a5c (encrypted)
Stealth Address
f0c04a6f769582c084766f7fe13b7433eeee0b9ca948947362a42d8376b1fc44
Commitment
cc8799152fe48bb33c7d81aa9b3cc62dbbe9094688b687c134fbd0525fb32846
Range Proof
672 bytes (Bulletproof)
Memo
aa7933ecb55c0feb45dbb2b6a24b42ea2e808e37e8a9710d590b28f9fc41f40da98df10f60730f90845dfa00fb6b3d4d52f8baddac752f8558cd7b84f302e857f1cce701ede98ab69617a3c25d36250fda23d67b6d25bd571c5c20e8680eafbe3bba153f38777188e21bf2f11d58ec5c4d17546d974b60ee992bc88a0d2c5bc2 (encrypted)
Stealth Address
585b72b86c5065b0a84ac00db2eee0f13101543ed348939731b107c664ddb167
Commitment
6437c79701fead85fdc1bc8d4d5c320a12d8ff805adef20eaaa6127218348f0b
Range Proof
672 bytes (Bulletproof)
Memo
68cb62a7d69d47b3f0e6200efd73378e4c78ad374768f7f8f02f5fce9cfc2fec54f1b5233cb69b1aba431ab4e2e14f070fb031557aa76e74a7b350e3968a1971198100bc4e09497682f0c2b510c4b8f6f588246d7978b2d4c293bf823f0996cf724a110e25a55e3632d8c6ca3c8a366293b35d2989771c09542c85cbc54bf644 (encrypted)