# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
1648c12213492bd193b4ea25ede6ed24ec26dfef44fa41f3e488f45fab71b16f
Pseudo Output
1c5dc5f49a184ba1ca22523b48bf85542f2266e47f8f6132db4c282e1ca9096f
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
784f5965e564139e1cbb13c1762036eea15a1495e86f96f6b9997c9346582e7a
Commitment
c439d94831efb1f2bf5617319a578c918f3404c6d4e6bf66729dd3c433335a4e
Range Proof
672 bytes (Bulletproof)
Memo
85a96d13b65c737e381ffe35616958e113608e0806cd68786e36811b78861518be5b4036afa27b8da96bb4b92447897e3a435f97c90c419a312250a5fb227a3cd8dba10b3828ae32fe85569a7d6332af2a0196dfb412e19f2fcb2127c08e37bdfdf6782322a991d4ee09552e8e552a57a4b4e63efc0a6a1733060addf35a6287 (encrypted)
Stealth Address
fcebfe9e999c71802385c13b1755a962856a0f72b23bafd0ffb7207e53727575
Commitment
561b15fc936ed2746124cc7a4fe9f72d39ecfd38038148a93440ca7d67f81f45
Range Proof
672 bytes (Bulletproof)
Memo
1da08e8133fc57939ad714a01a312df865ec22e8ef28f27c2d87d2095b772dcbd322e0d5594db83d449b6e65350f6e53c0377bcbd6ecd9fef7ce8005ddebb116fd6c3d16d57b1074eafb6226f273bae88b4cac3a71f50e7228e57239e60daf75f168f1a9e948bdd21b74eb3365b5bb47317759ca474eca9e8196aebf6ee09a53 (encrypted)
Stealth Address
48202583513103ac655aea2b62a949b8c97851520351712a7f58bc29a0e92c67
Commitment
dccfdbdd102e05d1681ea7f95e259d832a6620f64bbc5a606fa1cbe4311d7b66
Range Proof
672 bytes (Bulletproof)
Memo
d2ef472e7513e753ee7c47985b912e644974d159793b30bac094d1d714f352943af79966d10428c720903829afa9e0bf8de96f0714b4187eb5fdb1397f1733210d8ab738314671372c5d0d7df5cd628daff2f29d9008de8f1e8266d89485c490acc35c1d6520971c22ed5e769b0c82eb5d88b730d9f26f63bb5d2d9fadbcab1c (encrypted)