# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
6e09b272e2d2e1727f965ecd59626afc25edefc472b05331287648d22866a345
Pseudo Output
5494270d4018d27314ac3ae6226ca7d32139a02288d0bdaf4d7f14b15d4ff96a
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
2614233af6c78286717d23be0e2526bdc6a8c5c28bdfc070c736a5f1dbe6cc32
Commitment
92b3e9e331aec76e84ec42fbfe32b245a7a9a1353514be3e35854cb12705602b
Range Proof
672 bytes (Bulletproof)
Memo
7a1016f1df10699332fc40dd3928066f353410e1442b647b015fb6a5c7fd01e97e464692e25807748b3addea36cd7be485ad06dcb1f561265e3c0aaa1012f1b3b204a1cb46cafc5a012ad3378f78af2d620596c0dc5427a2ff4012466a0917ea7e521bcb790e463c21dd4b856bfa2cf7a46490322d8f11f0f708cf6de6f14a1b (encrypted)
Stealth Address
58776a653f1db10800dd839361db8a09680d17af5a4cb307f10239db12d5842f
Commitment
2c322f5e3fa38c5856d78d978d5bbd5ebbe8c2cc8108edf8bddebb5e3c29ef5a
Range Proof
672 bytes (Bulletproof)
Memo
cc9a6fe6c4d2510e5dfcfcf49eafe25912efddcef0002e5fded8b238a9ee27d3706aa7a9b10a8b9c7bc6b4bdc248d9864f6fbe2432027570de4b8a71853da26bdb65d4c26387f0b0c2bdfcdd2d775d4cbfcd831e1d098809880ec5c092bffeade79398a72fd952768175ed7bfd26eecdfa80933b7a7e91b1177774f3598a195b (encrypted)
Stealth Address
900bf0ecddc10087628a71120336c9283e7f86ea30c335f5a70427f8aef49d07
Commitment
e81da74cbabebcdb629981b98384bdd6e0a0f322840734baefda3b0de871fe63
Range Proof
672 bytes (Bulletproof)
Memo
da64ad82678650ae31a58270dc8a578d1f14bff809b2bb2a7ca16f342044907e643fd138f96ee5d90336df99c22b147e1823d4cbfb27e83a58b998c6e0cb49e64db0d43c162000d5524fa7d95b0e22e01bdc35de4af9bba08c44f917a51e2127cfb0797f1bc5ec9475f1f16413ed6500e61a28b0f3b86ab454bce8432ca7d5d5 (encrypted)