# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
de0cf6cc4d57d6ce5f855d3763f7cc82752544d295d4a157bf3a570252c3471a
Pseudo Output
6625c263d704c334907be5b1ad455e91128a72c33b060c9a7ffef3b5fb05836d
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
a4a0e68cbd4967b7373ebd41306014ec07253a347d33e1ca831119fa26acf31d
Commitment
c06827450ce0abdff77f47a0e6b61d0e63c237653610136da9669db87bf23b71
Range Proof
672 bytes (Bulletproof)
Memo
7d328ad72b989233efeb2607cfe3cc5a464fe33065aaf8ce9e5dc6096de9c86f07d9f13ff8db2fb6e91100374da3b99f964c46feeb14e7c7b48642582bb3bb2599be83a8267515182674c6d3ce04f60e44c815fda805289a82edd920ccbc58db48083a06a98ed2e0c7300938b7e4f60ffd2e1c8352f620eabc2d491f6424ec95 (encrypted)
Stealth Address
0420abd12254130a40bd4e18fd9c792635472d30947a5ca2189e47a465e7f30e
Commitment
74a9e3623aa2bb357c36f9b2bfb60e03086752880563d932961fd66fbb385618
Range Proof
672 bytes (Bulletproof)
Memo
1c05e9f45ccbbe7efc30864561dc6eb3fe22040daa0b6d34ac9f9eedec39cd1e8c7c598faf2a7af649d9dca3b310fbca7c18fbb8dfdab7a7845685ae3bc4d0850a56115d4139fbf5ff35c9ef682200672800cb73c3b83f5a7059763c7ff110bc0e29a57188d10cb9fed0b43ebd2795175e51f90e27c970883e1e1f1efbb89ba1 (encrypted)
Stealth Address
8a28f6bc7583c5422a2c05bfa242eeda0d856f15de76b2ab1b8fbc851f398c5a
Commitment
e69e2e24b2d84cf950a4e3b8d0fbf6452190e5dda7d0d382ad17939fde02ca4e
Range Proof
672 bytes (Bulletproof)
Memo
65a4c43d67ef52de5d4924e15512cf85dd24b3362d820bc5976b50091a8c128f80f3987f3b63bce0887d9ab28e9cde290b693fcbdce4133323879c72c80016dc12227b91d8a57e874d1e566aed68efe110ac258b43a246150e93cdc01a30228ef0fdb838f1ad1b08a8e4e09cfa488b90b1e45ba46d80122eb12fcb42402b3cad (encrypted)