# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
1e8c53cf793b473e4367b3c371ac4429c20ad5663ae23367976985e2f5318b22
Pseudo Output
841e7b2413c5c3e3e1a3799aea64e7aab30624ed02021137feda57bed843a449
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
d47aa2dca556997e65df08ee69733143233c5fa4f0575ac3d2f7bfe8ccfacf1a
Commitment
b60fe22f32980727a38d251e6b6d3e27f0d96216c72f04fbd2366d51ed4dd44f
Range Proof
672 bytes (Bulletproof)
Memo
8e4521a9ede56b3f5883b5e10b1b9f78b626ac0fd64534a5b4f1df7f0e7bd318f51c7e5a97fa95f4acb663a69a0cb329309681451f697b8a9f990e10adc77921fe0b0c7a34608ffe0f3eea6397749b180f789613641ece591572ff381a3aa2321904988ddee8d0331694aac6f06a5aefb7432cf36a45391a5317990f2f1fa5db (encrypted)
Stealth Address
b4f1637878276c68705fadff4dad1488aaa7abc6d0ff558d9085de614cb0ef7a
Commitment
aac5e4d74d03c24c1b8218d2f362ef72cb3f7fb116028d60624fd93c6077dc44
Range Proof
672 bytes (Bulletproof)
Memo
226069c134de60014368cac89064b444330d41346ddf5338a993f4babfe390a7aaa46b35551b7ee897ed13db7df6308948fec582d4b15c52a3384c57697904c2efaf33c152b14fa5f44214118f36c3b423a2f216d809f11e99f7810fa8710d0d6e54e58037a6fb7451474edb6ce35a6ec48524a7022ee75e7f12bfa6e5206e14 (encrypted)
Stealth Address
446fdf6b22cf4bf8a011c48fdad48108e10fd587f4cb83b7c571d4c3db745a49
Commitment
66320bad4e93a25533cf2ac3cf8ab5a5524adcfac7a13f0eca7430d0c313e30f
Range Proof
672 bytes (Bulletproof)
Memo
aef345f6592bea392af12cbd88abf2b660acbb5133462abbee3129b6cb2d7a0aa8266c6b4a49c56ab2c839f723fb6796c77c4fc118a2fe8cc36a9a4be8d9cb8917416e9d113cfb0866c1ceae34f40348959bc8205179730019e094ee1b9346ebb4e80c6198972424552b4df1382a3a762f0ec2d9e48cf74843e29b2226b14e42 (encrypted)