# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
b260192d36384f81bb85f55e6d9d549d2092970d130cd41b677aa1af0875a315
Pseudo Output
8e691d126c64a65f10135dc2c4b271bf5950f9ded727514a0decf97121264b40
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
62127ed0f364ae1360f4fcd39e11a08de3959b187918cbb7de66f829f912281e
Commitment
5eceb3fda173b3303623503ceb20334082073d311124bbe31f3c0e1fd159ce1d
Range Proof
672 bytes (Bulletproof)
Memo
741185a410fae84e9244fac0953cf8cd0cf1c2daa5f865d70b3e8c607eb7ea819c359a6c278dc717d58043fbbb09b693461e8d85e88a5b54a4fb8503be763643cd5c23f21317685f4732d9b84783718e8bfb106fe9b6a747f9c85115e9a1e945322d2c3ed831dce31afae27362946ee2ab72dd3a249e3f175d310d1fd501c4cf (encrypted)
Stealth Address
7e08d1db50151c6f3171133db533af392bab8d4bd602f3b39d39e4325c79b45d
Commitment
cac1f95365cf7f94132c749379a4f0cd66a5e640c906228e3b6c6564c768df1c
Range Proof
672 bytes (Bulletproof)
Memo
af920a6b06691885bbe7d1bf5f9f3f66b3fc58425ecaee6e46ea8a4caa1c6a580eefeff35f708aedf74d83e67a49e223cebcb148e577b1b80492bda272f89ab74b9d20e6b4d4f32f8515965d1c3d1604fd88590d4c361ee81d7ea4c709b835b3beb6b3bac5e79c4f5018e3444a470f09c8865bfe31f23cc6e18c6b0e8fd74d27 (encrypted)
Stealth Address
5487c2b6351308df3330fdf080a711f0b2246decb24be11751945f3934a45075
Commitment
6848cccc97d3ed5ffca3285de3de047a468d58703baad8f1cb844cc58ee6ec38
Range Proof
672 bytes (Bulletproof)
Memo
d2889b661f3b8c356fb16ad93f421d2391328d9db5015692031b87af2dd59ab225523886752a2c9432e22501d59af4a1b819021dd465dbe9935628a4ab5de7dfe93aa59b98ae7990b60e41b86bd117a4d7885c9b7fc61fa6b0f6ffcbe28270fc6f2a79880ace5c7efba5868e760e6556406c9a3fd0fb33c3ad23e47914d49933 (encrypted)