# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
ac455c1ed6cd9a106af6986d67c92310d301203447b3ee14defffd178c01d61c
Pseudo Output
0e09434247cf9d52e85f1439c0d429a1761a98a6a7659964c8f0f221b0da9d61
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
d86febe9ba94b3e5e88b68df38e25aaeb11eda3f4011b33d557676bc2d21ab17
Commitment
6cd895b7c7077e87be9928de7c96dcb138c79f247596f9f146bbebd3a8d4590a
Range Proof
672 bytes (Bulletproof)
Memo
0fa0c2e054bac335497482769fd6e1483d13642c731160c239f60a0e08afd10e5f2f121108b072c8951109ac681db76909a14dbcf806284048ff2b95cc39dce460ee647c67131a565623adbdaffa0b4829aa7eae773dd6a439d651638c9eec3e3366612a8b6c6c2ef242d4640a7d801b917def14ca17f9feeb42795ef4623d65 (encrypted)
Stealth Address
dad6539ce4c4f7990728e3cbf1ae30f6d10ae979aed5f98224d8a195e9973a64
Commitment
c6bd811b2f6d5fbce22e0840dccc3fe9f4bea527030fcfeae3d715cea3e7a63a
Range Proof
672 bytes (Bulletproof)
Memo
300a7561c8132fa084c995d1fc13fc60a862065c185375c170ea28c30ad84f470213f0a985f1f1ae216220dd51cf8f03e56c2c10c3efba01389c260bac303a0ed6233ac2c18f7b8adf408c4382a5c5cc4a70c92a7c8ebec04b2d3db76c83b59a1d5aad3d2e82c7b2061370bb838dfc02a931c4567004f9f8338dc76dfd18e235 (encrypted)
Stealth Address
b65a13ee36dd576b9cdcc633869b61f57a828c9898b625f6515b3d9b84105858
Commitment
94cd17c7b9b3bab0b3c3c1e22f1af5ab8e89cf16bb9e4bfcc30426f1e345cf61
Range Proof
672 bytes (Bulletproof)
Memo
bffdfac10a40921aa6bbd86d321af4a9dd1b815afc479a8005de2070c82396f9bf80d44ef2af96c26c6985f3e2ba71fb218009dbd7095e0ecb8ee7f17efab1eeec2146832d8e696fdc082d197cadb0ce3a19b5b8948e9e8a44b675cc5e731ce053d8c93e820b504c50675dda37a7ee5e755e061aac8d9d414294902cd85f19ef (encrypted)