# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
0820162534299aaac0e92d964af38f04a8f92615780675ef64cf9b8ec792e21c
Pseudo Output
503df4d7e4daeb80efed76aac49bd827d3373cb0683ae5239943b3ad7f526866
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
d23127e81af90319232b0c01124bd2cc2ab3157828ac824fdee706f7d2b35424
Commitment
6c5da98eb5b515cbacb6d71c73b140f3bb4fd892402f8c3e86c0d244e85ca940
Range Proof
672 bytes (Bulletproof)
Memo
bd60a94cd845f7673fae59d01e494ad254aa5673706ad5882e2f6e4822b9fb355dd2f356691e592a616d9940f304afc5d4eb4eba531dc796a708995bdc03bb4174ab2fda70d43398cf975d0bc2c6875d2e51e933ae5bbddfdae5d05ea16d28dca84b093f5d30b996b4b1699571c065b32b2ed2205458c558ecee159b37608e42 (encrypted)
Stealth Address
6ceb02f678d0dc169a616abcf1b8306123b0d63feb164a1270a5c8bf741fb475
Commitment
dee1aeac0b55732815f3d6cf4f5de0b826dbfbe8fbc2cbe1e8e8869dc7594f31
Range Proof
672 bytes (Bulletproof)
Memo
6df8fb0c566a266165687b9b79b42c519a3dda9b3669c03e1ff8a16c964f807d0ca49ce2d6a5c7a1c8874188d712d42adabdab1bbfdb541dac8b6d0c1586b5cd43bf34ff0a433acdc261de0860e48ea1f4aed79535410134c7e0cb801089354751b50e714ea3469a5370b0121d401e26e51771f795d10a6855d88a351f8f9aac (encrypted)
Stealth Address
24f99526709e482ef3308fa23455ff4e1aa2491730f7e22251e938e869963d7d
Commitment
9e72bac273f69056928b3d1cc9b003c310e2b6511d37118119879c5db002113f
Range Proof
672 bytes (Bulletproof)
Memo
91e919dad31710f3a1baea86ab46bfe3e0618864fea84778c66e2385ca24f3b25e89fecdcd78ed6c906f1f5e52bc71396f8448b37d46ed4a5b76507e9e2bbad9205d4c11a20d5eb3afa0630c9d53abf1b40a58a6807bf6293a735900f6c2e90fc8b9e790c6970798d95d099897f315b800b4e12a2d34c4e3fa9a8dd899dc6cfb (encrypted)