# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
dcd68f9432b689ac415a4ae9d6b071ddeaeb51e10370cc1c9c0b2727654afa2a
Pseudo Output
a48269636a387f25f728d65412ead79617f5fcaa64885d40d7c6bc57949d9c77
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
d896bd7c30040c676593f55d54ba96e4281ec76c19df95ddbc0dbcfd74bbf304
Commitment
de4958936cb6aabcf8b0daa46c039743683774e07010afd40d03fb35ca1a6b76
Range Proof
672 bytes (Bulletproof)
Memo
31d96f3c8e85c10f7b8204ed1e1955b4b38155f0616ee9873b6b0b7cfa155bd722a08094ec383405a550f6ca28cb577bba49749f6891468c17065a3f56a63af1b0fb37cbecefb606bb347633b56bb5f131091c70ec19b0ca2473eb8d55870a748225464f76c923668a1eec01641bf8260210cf2d79aed04525368dbc24071588 (encrypted)
Stealth Address
b49f79eabd246486324deaeac549d1383ed26677ad9da470829bf4b80feeac2e
Commitment
62aad4b877d09bd2d47562aafa521680aad64b33604136c019b99769c17a8d28
Range Proof
672 bytes (Bulletproof)
Memo
1e4337b690b8d88d1ca2534b0591dea6e1735d7343e033f1513a9937b24882f8d1d3c9fa96c49db8fa7209185d45f17eadae2076b7b66199e73fa5611fd4956d6898fd8ed3037ec3a01c34794cf60b044e23125801fe2ad9f7cbb6584ca56f940c8ee52fc67f3cbfb20efc1a3df7dc4e00731f6d66ff5906a79c4441963098a4 (encrypted)
Stealth Address
2c63077e603eafd63a824b4b02aabf5c660856691822226fc00d6dd0df689d70
Commitment
dc770b9f44098361c2641e477afa0136b401e9ed818395418c83dbcc9871d678
Range Proof
672 bytes (Bulletproof)
Memo
1e5d26577bb4f4f68a281e80aa690b889e4f46bcb15a559579ee34a0a64d1e59b336a7c0669c7977f75c434671c4132c38078bd4bf3da6f132efb368030476168f5ff7c90688839db7e6cd868d069d75fbfc0c9dcd3972439bf18b5a67790e1baad9437acee3f7d8f5f39a2eff1d461f2d9dc1b89d05d2b317e173d670147880 (encrypted)