# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
5a01906fa25a77648866543f880abd70be4c37984c979a85f9e76b3d0d141610
Pseudo Output
de1119815253ccf4d7d977a562c7d7ee58598c97004317cb9c145fe2272af408
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
d22fe21c8babf1529bc48d52a26fb1c0828e3929bbc36cf51119f4442e633716
Commitment
cce2654fbcb7574362472a367cad6ec5ad0b267c1aec8669d7da3ba84acb3e6a
Range Proof
672 bytes (Bulletproof)
Memo
f7de83ec56af5229254d78b925f23b960c83fb99073a6fe8ac3f3f63161863372e05698743d35ca666d3f167b377faf49d2f540cb4431d334bfe19b2e1bfc71173414e1ff0086b17f0d126bc9096e20292e09cd7daa6eb0f335061d9b2d8e869ff7af1c14727f2a577740969bd6d774552da1895606804185fde3e66c76e064e (encrypted)
Stealth Address
7094e908307ff498a997c8d474cfd5ad5c03eda3ebcfcbe858568dc63d540962
Commitment
261bcc60e1228123970e954b117c5f209ceee38faa8725e86db7009c43896d18
Range Proof
672 bytes (Bulletproof)
Memo
f7bd6ca0ed3b3bb82e995f9986d684ff0bc66d5a710e0cb3bdd3a6ce6e5d0efd6acf2758828017289ccc54af1d82d98496e897092b9207750484d1990825b720c0a0de0f575e45379da88df0f87b07f445c1935f07d4f86f162ca5fdfc62e9037fb3db17f739dc69fa53d3d872842c45ee124f369114cd21689b0aa5844e3ec3 (encrypted)
Stealth Address
d646382e5957acf76e2a860047b4feaa7076cf2980a042fa44cd7dce6c673115
Commitment
d47ca6d582dd296a3831769180ffa48b24ccd0433ca4ae0c61dcac706c94a06d
Range Proof
672 bytes (Bulletproof)
Memo
bb64a13fbc22fb231c2e81efc8bca848892fd1cb294c0c6f5dcc15f98ada55c7033617a8cce8aea06a0b1ad65224be1e948c172d914894d36b650b907ed96f45b90606ed6f6bf5745eac6667dd19d2a97372cc2d72991934613cc765e0453cd8e7ca59ff12c164735f6512eb54894354661bf3067844c9066526bf6e00333c58 (encrypted)