# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
34ef2400b730a711d9230c4c72a2acec89a9497c2471369ad04af781ff442028
Pseudo Output
92053275e40984ce39bd6d0e644c79cd072b4987f033d09ed6ebe72c9af24273
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
5ec3b72345f8cc97516e52b0e18f45ab20d3714e96828fa45360e345c1e33e12
Commitment
88f1cc3a4a12a59e91adc7d8f163a92ede07a0f5bbc5c2c19fa2ee850eee1f34
Range Proof
672 bytes (Bulletproof)
Memo
315e8c7c6014f428a305cae2617033d3f7b99f687f79f03def8730d9eef96d0842816cb603730c574e810352143b9ba8b89f4b0b681f9dd3ff95f5aa26e54840df8f9d0898a59f2638d175db10379709aa20974c7f5b395e17bfa4381b3053387d19af6183f8786614b846f2dad80d3b5cd7dbbf7646fabe63881b2af89420aa (encrypted)
Stealth Address
106719f545b8c0d1e8d10db2752f8c88d34d35f7527f524b8b0fbd89bf78c77e
Commitment
5a06d1e8d189ef699b862be0fe7870fe1e253b8f183323a180d89448df360a53
Range Proof
672 bytes (Bulletproof)
Memo
2ae85b233fdc5de4065a625e058e9bb97eb0bf9144a1bd643755d72696b731707ee90b4594c9b3b35ab879634a2463cd90a7cd996bd1b58ab2dc4fb288bcf700cc0ae01cf208cad34a2fc71f2749333cc3998ddec4cbb03c0096552515ffd201f08d59bc7c269625babb8057deba78030fee9b70f8b3dbfce53f38ea6aa33456 (encrypted)
Stealth Address
606078031e7fb07662c7347d1e5c240b91a2c2fc05d38ce617518676c46c764c
Commitment
3ad162325770cad89fce92b6e3c467448362828a0ed058433d8d130fb6764a75
Range Proof
672 bytes (Bulletproof)
Memo
2123ffb539ab246804328c727964244e01f68083f1d524f5e9307fb9570c26a496d68fe0e26c72eb1db6929418772d0dce7190aece529f03c1705e91a315c7accce5e37ffc6dd2f224c840ceefa4f8859305665ec21ad6f9decede436b0dc5089876440f6b76adc74c6018d0a74a1c68b372e004ef8f7c653d97b26a7d93ae67 (encrypted)