# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
96438a0f7584be971bfdb4111524fb15e6d7bdf23c2dd2ded5830d0571fb8c49
Pseudo Output
227ce46d7f8d6f57eee12dda349cc1826b9bffdee64238d777c81b8215963111
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
685ee40367775c73d765c9c55ef38759dc088b06d8c74da7011e2a0e3095360a
Commitment
5e3c7be61d1d4946d0c5b77f17557c18adad7d220f9b47503636373447270d76
Range Proof
672 bytes (Bulletproof)
Memo
342cd2acea1fa22300847b71ea9581606f75156bce7b484f5403e8373a7e123ee74561baca94702ade1eaf5d19944e7868b3a1628adbeb4c69f0d7b07abf03d2d7a78fd06212c6fbc039fee932d530142460b0093b7c68e0757b27b16095fb7f7e029697331475fb45d279a4f72cbcf3ff019e251671e7c9050de847cc7c10ed (encrypted)
Stealth Address
de747028ca02a1af3bd006f6f5b5d4be3ead66949a332e95327477cd71e2911e
Commitment
b48683acd20ce866e964f6dd40862030afe36276ce2179a009b27b869f93df3b
Range Proof
672 bytes (Bulletproof)
Memo
2a61bea3621a155a069597ceced7ed59a7cf8a8a193e5e56c49239ecbb93d781124bc1c47ce63a808292850eaf66c79b1326d25f23b1ef1da803cd7ac918feb8ffe36199281912d1adb3cdb68e251eba4033e619b444cc3d38248c7ad79625e63092c731b0c559e787cd972adf7278686217fc0f3a0a6812f1109c7eb5f0e477 (encrypted)
Stealth Address
649c07cd59212aa7beb3ddc1a0cf34f60d2dd178e69600aeaee1eea93cb65609
Commitment
26230852a545fcd66ef4fd01e88e8bf270152c4cc9e74dddd0c4832131762433
Range Proof
672 bytes (Bulletproof)
Memo
012afc558350fd9b923e295da31a067eb4a51829c374c67af9c2c79080dfe392916d3904bd570dc091f764bbab1ac692e2d8970df5a74d015a46bce75aefeef9825029217fafb664a9fd84c62e3d1ed2fa23deac30aaa232625bc9ad73a228a1dc017456ca911aac2f51fe8b1ba74497f019ff1b2ce95ebd758917bbf38ebe5e (encrypted)