# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
0c44e8d373d890b6691e4cf90475da922be6c27eed0d4406d49c75006593e84c
Pseudo Output
dee7d9caf1ffd9d194a2c22b426ab3218d0ac52533412309078a491b19071a53
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
b4d576a9cbc5260eed8f7cecb862f4d59b2c66d5fb32e09ca3dbe8248fc9204b
Commitment
e609d1a39f50a3375c5020b3903e32508cae19b13e2dc6ace1d3c85e85104659
Range Proof
672 bytes (Bulletproof)
Memo
788ae9764e066ec3c99aea0a89b218ae6f8b5f26941758ca938f842cf488b952aae82396c28d9e51a4be01ebff68df9a2cb8e7cf021632ed4d0ece2317f5f4b73cdfeccc568b10f972439ea3cfb405de7ad415676f1d97052ee3179a8869de7ea2c523497ea01dec0c47f485a59eb5f9e926669c2a1125dab9ed3d89d4f9686b (encrypted)
Stealth Address
de2d1749a346ca9e175ebada02238a26d1497b662c000586ab67a034f6bf051f
Commitment
d2cc443f5c7ee50ff3ec2cac436c342e64739730a2b79b27639a1897ed60ca62
Range Proof
672 bytes (Bulletproof)
Memo
d8460bd7e5205e76c3a4c06d2ff3c0efade03a31e18e987df5ee09f849a9e05a57606efab037d8b1bee4eb494cf0146671e9b755ef0b6ede49b3fc2e6849064baa80ec2d8279385b3aeca7b8ef334e7c10b319cc1a0a9798d572ea021a24608d26b3d69d07ebb68faa01ea93d4dc7ae6de87dcdf843f914c14c88adc6642ba44 (encrypted)
Stealth Address
98c767e2652c7611db19dbab9d240e1c0cf7a9b085c1599d292349d8df388d41
Commitment
7c2bc0d1d2255c2598d545b79586cf2b2a55cca4c58e22532f3bf7c9411bed2d
Range Proof
672 bytes (Bulletproof)
Memo
f6cd3646e828e73367134530a9c8a264701e69fec5c9afcf7a4814c54dac7d5840672f66dde70b5dcbaefa84e341ddc6231be4a259575bcb0af4cb68ceb16022f708fd3731e301a2e2ff4122fac39eca7959a6d284cab5d37437ed83503db91c41eb94a65eb5fe99c39e1169ebaadad0eda31cf80b7f8f01070d76e745a70754 (encrypted)