# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
da5a28f46db6ababe157c4c79602e138df6f680355634f231478577dc937e31e
Pseudo Output
9c274a76395ae254709ed123abbf0ad8d9695e68700c26c7d8058cf4a43fe678
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
1a4f1d21ef5c6a59a9655cbc1a8fa3a7655873a5a5daed1b88e4f001180de77d
Commitment
b89fc3811319acf89082238c3b7d211eaa299a41162474838365d313de916d5b
Range Proof
672 bytes (Bulletproof)
Memo
da21ad8ceb9bf663d22517f034900cee9d2d60cbd52ea7f8459e1b888d1e18cdbb8507313f5445d523c315929f70217400dbd768dbbc39a0fe59486b61df28daee20adf06f240cd4e355cbc260510b0b034b068e204cff721690a3cd3d099ed3f2c41fd9c5c6f04e3f792e8f5925b2cf02d06332134870da06ec10769d7c1b58 (encrypted)
Stealth Address
5cb2d1b243185c84bc78032661342fc5e3aa64ac7ccf7a5b6a0fd25894b07149
Commitment
265527fb8ef7979867227fc654f1369a433c037152bda33c3176ed3bf5085171
Range Proof
672 bytes (Bulletproof)
Memo
ffc69668b9d2751fd18171192f325418cb468ad9d0371793d375517b870351043c53a16de58b54346975950d625a57a5e58c9b1dba2294bf3ad7682ca74f83e6b35ca7a6b142c8a41916560b61030c67ad439a7e6cf7d15232dd8c86b5b5c69cfe2bf5568ecaaa8387e48141ebfe1165e204b71ca6cb8ea0a258c1a8556c1cf0 (encrypted)
Stealth Address
04b2f2a2b89d99ad0c09a7469d5b1cf616069ea441dfdb09d9e0985ee767d137
Commitment
caa734ba0ab4e810169c62e5fcabe2bd92ba6439a848dbd0f4860ef4f9a49265
Range Proof
672 bytes (Bulletproof)
Memo
b7e6d9db39b41ea5c5da73d4cc4a029ac5bcebeb9a06666c3d880c44d7a870c5a5981625ab8a0354e21d56758ed0ef3fd41aef2638c27b04613dbc6288e4131a900f383612d10770c5754709d746e936ee5bab443d4af8ece7d0d03f99249423ae7dcbe6d1447ebf53f8d5033b30db70e1925c041d97912aa9ed3a8dc50bd57a (encrypted)