# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
92fb933228dc239f575017d753072eccfadb142f64f4c7fe422c2b3e3aefa92c
Pseudo Output
447c54a107851a043fc6f3c665a315528b9a1dadde69d340eebdf2f9c1975b00
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
26177f6155f6e014c0e9ad76136803aec4bff4104e8a928706a4cd3c54821438
Commitment
ba8bbc1954aa206ac09eb125272c489afa44105b5e0f1eedf4fd70cf30a6975d
Range Proof
672 bytes (Bulletproof)
Memo
75116bf34db7bf93dd6559fa5b8c95a4ced2d52213b8607f3faf198322f19161338f082ad8da716711449eaddaa6d6612a90fb90cefe9f99e5735cb8434b8127e8034e5c289f1164a54ddf927288a59a6d191eafc3a62496f03db5de55257251dff23197e07018ebb0ef55c0e06bda3f67d41945612549e94690301ad420de40 (encrypted)
Stealth Address
dcce0a4e77f1e750fd6bd3c22b95df494a58e6a2d170c0ada8f891b4d2cc6b26
Commitment
662598fe154bf00f44abc2aa528a6a81dda6251d8beb6b5cee3d322571378c33
Range Proof
672 bytes (Bulletproof)
Memo
6edd83716e7a6bf10540612dc2c8696dfdb11221751d7bebe992a1dec6874df60ecc6a9d9f3067442319b7d072d78d3631fd9d399e0d63538d0d3a86cc72b3fe984aef16049a0cfb24658b6d3192f9b35e703db0c04da692d669dc2422dd812e2c2c0b78a82c2c169a257c8ca886abf009df75582e65beebf2646bbbad1930a2 (encrypted)
Stealth Address
30d7e279dc3b03d5903e3ce80ff162aa5c82e22f9c1c45d756727606ac6ff974
Commitment
2a206240a8400663de3a809e131e86856c7e4ce7f594d82616fc46f41233f028
Range Proof
672 bytes (Bulletproof)
Memo
6cfcda0796ed8be56f2edb7569101b209eda8d721054ef4fa19d8ac0fa6ccffa38ef8b74fccfa51fd6e4f54fb861632bd24ef27c55a7fbc747583232bb283b77b69836aebd3f4f810b291968840aaf173dcbb5b1ee08aba9879d0cc936d58757cd0f085070f29e40ff40b421d0e88b497bf03d9b83462c6c52365682be847d2d (encrypted)