# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
8275facdd7832e3b617024b52fb8e18d71c734a762a78cdc42f622c8d0e0e330
Pseudo Output
7498282585d409b1190a7ee3b3be620476a1b99283c492070e45a5adb1100c66
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
40565ac3ecce71e02f4a063ed1837167c5ff47f625e2f59e810366f3ccc7e30e
Commitment
9eaad2c42241559e2ccfbbfc424e1cf05de48530dbb899a043c5a745cd8b702a
Range Proof
672 bytes (Bulletproof)
Memo
93cd4451e11b4036b822527b148868af4b0e3fc5cab47a7145774c8245f36a2d56e46823a842d416ae832ef33d3fe85b36e3e1a060aa0f2dcd21140a13ce5f7adca2b14de2e2d2a899cd28880b61209942f0ff66747ed0cdd1ab799d31f4d07fa534e95e7995f8efada64a062a3759391e549d8e62f26743771a0d5b62d9f633 (encrypted)
Stealth Address
c01ea27f99ffb38d44540e1a64ef36a7c10567d2aff93dc622ddca278b1d2b30
Commitment
e8f27f25d298d9ca7c044284bdf0ea7ec298fee6315769d4e59fbd98ba3dc441
Range Proof
672 bytes (Bulletproof)
Memo
eb0484cc9091608db5ae457ae6b78b946b5e932b97f2b1e96436d629f8c8acc3447f37c7f3fe979c01b661babd2efdac210aa9343de0714eb075be4cdfb26fc37efbd22fd0cc1a6e7eec7c5e045cae11bcbccc4ea33cf80f942a51d9c83d71a5fe0b1cdf58cbdfd46716e556b7a6461d4e9d94dcae13d949b80c2bbf3d02f590 (encrypted)
Stealth Address
f2fab7fe0c93399ed9a30f18103fcd2d93baf72ed3fcf7fcf700e4c6476bd37a
Commitment
3e68f3f98cf839a028371283fcb225e4b4b2489953145d2dbc16793bead0104a
Range Proof
672 bytes (Bulletproof)
Memo
294a94bb1cc88ba96ed593c6f3ee84687b68271b89a5c05cd5ea61f8069adc4d6be08573a738e7479f303f75e01a3113f953cd216f0634e578cecfbe251e4e7b918b74320b059502b328abe15e05a03058c96d323bf78675f8f8d33de817d187a880a00734dc092a09811d1e3f2af011bdd85bfb643a7da83c46f954ee227278 (encrypted)