# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
c435719a1838ed3d95f3cd7e6e4abbd23145879dffc1990db75116af91195a52
Pseudo Output
2694cff4fc07b27431f513f3843910876e3c0a935427ad73335c863034152009
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
869589f0ebabde9d039c24360cba7c15dff2db62b1b1f2435567c245e219c81f
Commitment
2a2908bb702177122f157b362f3dd85fd8920c078f20760362c5feaacb1bcd3d
Range Proof
672 bytes (Bulletproof)
Memo
7e93f6617294230a50a44ddd39ab376e86c156a5db272dfefa4329f39b14bf2a172f098429a935995cfd6abd3a39ba370d8068d24d54ee5be7cee97ca21d496b0b2c1248eef7ae6ad06b62d150c74f8c27265b8e23f917133d955b9995947e8e4c7e63151336fe0d224c483af4b566d251ae27a3fbcf1eca78e28f7bceb2961f (encrypted)
Stealth Address
b4302bb738a9fca2dd67ed7946922732984ca19fcd50ae427d6b9afe9ead7d1c
Commitment
6ed307730c12762d20a2e0eb574125f757a43f07ed6424af4e1fd84ff60a2613
Range Proof
672 bytes (Bulletproof)
Memo
8e531f4b49e63c7eac9dedf68ab6c49af87be4d05bbfcd9a95b571510693aec025c860524854f6c4c84cd66374df7a1a07ef240d3d1158c74ab99cd345da4634a4b376f510fc9082b2fad517760f6536223049f42f26d561e794938de60dcf73a3df0d7b90a111dfdbe63c9ee4280458d67b7ff16af9adc8a3ca9c6b5ff722f6 (encrypted)
Stealth Address
184112c3bb720fad2eff66d7233018b0df009a2ab0008fd28daf1b611a7ed130
Commitment
808d85a9c5752597eb95ec06b9a6f63b6aa370ac35fa3dd4fc5665d177ed8c18
Range Proof
672 bytes (Bulletproof)
Memo
5368656b5810aef09302cf73d6daa69796ae5c395cba49bd16aa49bd22d2b31b4b19fe732228fc6b4e1550f7ba26eb0725bc6d0e9f31e39d7db537dd79cc997a1b28a6ea0b27a21d3a75cf1281d6823f58dd13a15d5aa1cf631992f3245fd002f72bb061e43306e25346f10f0a7b0dd8d20171d6bf2f1444e84335ada9c7d207 (encrypted)