# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
d021b82d1182c4bd49cb8b14e0a37afcc5fc2ec1c917b22b07f25b77f550556a
Pseudo Output
9e0ec8d0419b08d632338370cd21b7443b732f51a565ae2a2d1d9327f89e5113
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
96c0a1f0ad01f080b6e1f9cdec5683de4f30ca83ad953785350e042f39e68163
Commitment
069294cddbf5bf8dec256c4f8c2d5386bfedfee468b9838ee6c402ebc131a474
Range Proof
672 bytes (Bulletproof)
Memo
ed210e63975b70f72201fe1ec412a1c58bdcf07bf7fe6101867990e9795c3f6c25c0a419a66eb945536aa52ef27ef5989163b74205ef59453280808a6c4fd050b266aa2fbfd22701d145161bcc303fd0a5b582d73eaf185875ed1883fe03cfdfda3198acdae8e7250a0612bae662ee222c8ef1e6082fe3937e6c2184af526456 (encrypted)
Stealth Address
e2cfb7da962a2eee2b560c79d2fd7b1f1f621ab866ee70c96d6407473469b259
Commitment
f20a6636b150c1960afbbd65b0fe60d6e2c66e77a9885c3b5a35b530d2b9166f
Range Proof
672 bytes (Bulletproof)
Memo
4cca7fce632a58e51ac9432afed59fcd58bb0c3f9b91ffbe312e4753aaec669f0b598030694baa83e0c7cd03bfa6ab29325d3a40ca51ac0629b765b1177fe5a5673dceda89cf86ac1e85482a750255ae0bb329ad37482155d993fd13be7be28783935a02d698f90117a51bf2c7b4cb5e55cf7ef5dfe13fa10efd581b20ec16d5 (encrypted)
Stealth Address
0a4d3ba4c7f7ca95fa0ed5802db2c44ffd549605db6a5b9c18f7ac59ea88d56d
Commitment
30151cba55a8a91a51a57d331dd21a05230e71cdd98698b1d0684baa1b6be055
Range Proof
672 bytes (Bulletproof)
Memo
70529ae8abf41b7f31ffea2d3640182dcc7d98db6ea357d997c61ddef063d33e2e4591134f6c59a29877279b2607ea29f8f4481f51567bff12a0f300f55392a1ee7149d05a64a820a8674ff6fed4f56c08da49f95d0580fe5d6d9d4439b83aff01b5072c56cffa626220da02218a7991563ee569945dc676f273bc96fbe2f83c (encrypted)