# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
542ee269f656e792e13de79e6c70aa9da90ed4d4574a582d311043f2e5eeb94b
Pseudo Output
148a8aa29c867ae092cd3a2680bb3ed6eea510ad28af7e4fbe23d7541824cf45
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
a2712daa8b69e1b03be2a22612b1783133f070ce73635746a2cc4dc6175d6359
Commitment
f4ed488026d286004120d643381f4f7a923125249e6c07a0102e16166771d85f
Range Proof
672 bytes (Bulletproof)
Memo
74ca6e7e956ba87345d3a21c50b7a7d5ed6e85b50b17085efee1af422ec8226c6568a7578bed60e9147b48618a6bc51740769fee7d26f5157039a5d5842c6cb9e2061209e69de5b5866d96a77b1aaa4e4da7d55646e339f733c91ba424b1fb0781566a201c07eb75b43de79e35be3ea7aa788b3f1e78fc42f3ad7f5ef939d79d (encrypted)
Stealth Address
eacc790afa6a26da1e75fde03009dd23d7bfaabd221973c0dbf9533d6c58a534
Commitment
34e6402aa825fb5bfcd3e730dc0acfa2cbb951620cc2d682979b067d1fea2756
Range Proof
672 bytes (Bulletproof)
Memo
f075ccf7a4a4ba4bed334b1d42ff76e8daf68149014b6c2746a3fee615a2ff86ad7012308ac46c083134ee47f83ea4ec2a05123ff952ffeb7d618a46b55e4ee954e3230d4f711478b10629645f5e5667eca3745ce8780de62a238b48f7bb42143a05396ac0787630f7e701af72debe6666be0343beba8b5190682e63e672d470 (encrypted)
Stealth Address
e0c567c61e195d42b4c12061bf96d817200f4d7cdb299cfa3574871646f47344
Commitment
4c67937534227b2db3b1e814dee93cb12d0c22b0a0227f69d69afc9ef117ee6a
Range Proof
672 bytes (Bulletproof)
Memo
dc93ecb55793d4b0b9567b5fb458210fedc4c427b3466c9228f7313047fd1af86b4874aeccc5c7af9ec3f948071af7d1a1dce8f22f543cba9fd0a17ab637bb20a819e432ad8603322d0ed0e40c1e137cc2fd718cb826ad52fb88f2d26e0ebb2c29d1a54116f92cc08df575ef1de9c676df1406707b56279faa1585814edcd3db (encrypted)