# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
36d5eb18485b7502b3818c25370e79b5475a947d572fd213faf7c17934ebde46
Pseudo Output
a6548e0178176877568a4e830394a154cdeccd7648daa104013435de1982d865
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
507c9226eab932e9899a5bd1a07d3fef6e00f5f050ac1a1da8ea11aed4a90b72
Commitment
0671bfdc24c6c64c78696ba8296ca5a4529dfd085b3b3df14710b534830acd65
Range Proof
672 bytes (Bulletproof)
Memo
5865f9b7fe584c1d5f7582b3a803c9d3ce247f40663a8d22e17370de15fa8e057a8eb773581472d250ae238e10b8aed1f933e359ade1423d3275db84810ee04de8f49c55ccfa874604417077331de291d614df0e1fa17dcc98e7366fd8733b288e21c407f129e82237783e222c4cbf5601eec77c935b8ac0d8fda02200242738 (encrypted)
Stealth Address
82cb4e6e3495f9ae7d8fdbd66974d7f2c74afd3826f5e0bb314362ed08a1d161
Commitment
88578299766fd60397548639959cb317f804cf75598ea398b40593ddc9ff812b
Range Proof
672 bytes (Bulletproof)
Memo
43720991f6fcda3e7000181bc524e5f611de23425a4b2fb9f08ee24e82010c2d1419a3f73ae9fb3e45dbfa3e71a44709ad335d02ffa884874c8bf8285d61f9d71057e2f83bf314a57368267c9d81c3847a1724a61db5db97d99bcc6290ac1be4db61fa979f855a4cb48a9779cb4caab1c1d7ca3adb324d1ace5a3b589787f148 (encrypted)
Stealth Address
56e1688908e9b10bd2a5129971af5f3908e483d8a2e0d4e5c3532e763f111059
Commitment
400ec167770f58504761058a06ec2c92289a5d2a80eb17e172a4c756b1f56e2d
Range Proof
672 bytes (Bulletproof)
Memo
8d5370567ead820bbdf0067b8be8444b7c544b7740cc457034a77f83eca4fc83df635d48ce843dd39284ad4aaa69ba16da0a8127c2106ec4b22f30e86938045520382808013f83d82fb581cfb306b0dc506cbb6b16024067d19236e994a4ba4e8836ac1e642144fd46d3db50e8e32027059f9a22dd9bed5557f2f785383c2b54 (encrypted)