# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
4027eeae100f6d8797849e74a9e25d80de75fab243ce3c267bb950c7e9888370
Pseudo Output
b214cbb58c61e53ea6b2107fe3ea0e26ab3f2873360664884047a9246cc82c64
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
76806ca29a3a39bc3e3c6f88cad5c1d9c5b271fd1ec878cd8c44a5da7e512578
Commitment
4c4708a899eb9d2bc6a86f4f59ae3e1d0b1f0adaed3584735a0270758438bd35
Range Proof
672 bytes (Bulletproof)
Memo
a10c33b3b780b1ce87830ed3609681f9379cc4e5db084f71d3dba7eb5d0d2cb50272a3ef58e75db811c83aa90ab861ce36649ce650d6ee996205def632936a8e1a87b0af000eea4018baed494efe8e5a28f791ae8d6510c8375875309c6bfb394155d393152b8f38e9816a33f15ef5515115ef8e913722c50288486f5ffcdce2 (encrypted)
Stealth Address
769a2adae405eb7c6b98752e99de8c028445c3111b3cda3dd80cb5bef40c4e4b
Commitment
e637aadcae8aacd0c2e0e1470a512f1206772d80c535069b300f5072d1994051
Range Proof
672 bytes (Bulletproof)
Memo
6de623736ab1b56767193e7f68f3b80f1e6ac5b5ca19da83235ce58b91c2d93cde4d5fec0b345d0b4ef78fa83fdcdbb608ae741118795676a93eceef490f240ef40782049e9819728e7d130d4a3a0b47fbab4aaecb7fe01b81091b39a8f94c87eacd5260de4be8949e1ed85255eedcb6164923c44a4e2d0851361af8549e1f45 (encrypted)
Stealth Address
142c4ef81356b0c86f4ff22c26beaacde514b281bcbf46202c9abae86b1cb14b
Commitment
b2c35f10a3d6342e56b00ae02ada81edf933c60a730735b7a3e6b7e6a7d9a83c
Range Proof
672 bytes (Bulletproof)
Memo
6ac62a9fcc19b5584bed6dba25b5352fa32e503c0ce2c6437785449dcb833982f7c53c2cd29cc679d63c3e88c231d3efef1f51940e8f38c0b4efe6ec8b930dc82eebd55a99f5bc7d84476c58c3fa1e538f7b38d811f12c4aee0ad2b81265e8be82e3b73c3c3f0994cab08ada529df827839e1a47c5d8d1b6b3d08897828503b4 (encrypted)