# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
262616ceeabce973671cd30bd56ceb1e361f2ab44e6982cd89c20f306fb85162
Pseudo Output
e0941f654944b962212a8cabc11f6f120d895edb6a05f814245fea974aa7e42e
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
fc6fd7986a2fa97d13ded26d7540e2742f6433b16b03b6f7d674b233d608c347
Commitment
34e51a92f5e1b598f066a2f97e5e708b0103cd120630b4190015bc8a4d2c1e1d
Range Proof
672 bytes (Bulletproof)
Memo
5bc4e46ef8ca8f8a342f42be89c9e47bee5bf99ddcd5ed416597d41cf5b24e7a8ea4cd363bbbe684ce4b7d77644d6462e0f90448c7093149a16d7e64dbfd24e0f045cb0c54f27e414f4dbe79ea9762ea3834dd93454219e91cbbb7bcb044ff225c2f1a3b4a3956f15db42842e92352c1e150c443af838904d7e9394ada186b11 (encrypted)
Stealth Address
7e3cc3d8a2884b9e5a568c60319810e9bd5a58d0416e2e99f86fd7517c90a707
Commitment
20dece3b62122dee8512759c555d0726309f7a0b69a597adda504d2ec6ab0560
Range Proof
672 bytes (Bulletproof)
Memo
c71898f1568bfa9cf7fa10d144332597307cbd8db1c8b8eeea8c65612e1c4fb57fbd3558573dae35a94d526b8a3c2467b17eb75a205a669a760afefab03cad63ed08b1792abec9679fef405dde195cb4fcf66c79a5675e29d1cba327dc4259eceb3c2366f8154960d53532e8500e645cb6cde0e5c520a75adcb45d9544f73e12 (encrypted)
Stealth Address
d22ed6a02fb83f8463361eed2f9f4c862dbe037fdac30e7f6076285b721fb367
Commitment
5adcae6a87a89bc75304e097f89def2b23c2d10f5946345237ea4925fedaea24
Range Proof
672 bytes (Bulletproof)
Memo
a620728dce19aee352e1a37fbfb9de1bd88c0c6cfceeeb39c11d0708facc34bb0dfab234ec3b88d1b8c52182129602fe76e6a46d13c41ce67a0d54faa0c60d0b1f4f712a916a04ac160faffc219b000f25e6187cb7541812ed621cbf5cb97388eca5b91bb08f44f006c2825a5fd79977b7ef218009bcb6b228136bfb0d92c3e9 (encrypted)