# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
32b7dc9f1494b531b4071ce1aa0deac0c94789bc74a75eccae45833520e6a349
Pseudo Output
f09e5d4c4a1b634f9011dbcee868057c50192aea8abf112eeaa467d6f479464c
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
02239cede718b76b5338a95f122514512eb9ff4c90cb744a6215f71fa7e7c606
Commitment
d0be16c04c0b1a31c65659b565872368d2c225a00b027242a0b9d9e25382185f
Range Proof
672 bytes (Bulletproof)
Memo
7bbbd1080d71ac728d73df4bb01ab8d3ec9a67230995cadb2be0609533ce7ae174c439019b99760247d3c6b6a71a4f544be685022028ae8e4c3fc25e92155e171ba9cc661c39626d1f6659795bdb702049e7e6b0bfdf5e425a4faced29d57d8463fc75fc3d708883a3485a38e5aa6c07f2d09b1eeebfe08ba0daca487b25cd21 (encrypted)
Stealth Address
0ccd3bbea733467719c3e720e06d123a3546af76784bd5e08e30f8676f429915
Commitment
4e1f51b943e1115a1ab93a95054eb50469c45ee117c85c18e40cb3a7a0e6ca38
Range Proof
672 bytes (Bulletproof)
Memo
4106db619db65f1f1ccf7b56c957294ddae39b7c9702aa5d14db524788ea7cd21a462912847a7a4f65bcd1cad207265702fbef984003773fb21b40d6896f4912c3376e449e16dfe68152d86339a117588cfbc1efe8067d0c7c3b0a5639e52142148eed0fe627cf542926a73b40a1896198b4ff0095bc5cdc8e2b8e9a24b1fa44 (encrypted)
Stealth Address
44020224f3e3ea7a21ddfcba11f17d68cd03054faf371f4f66ea7541e4d69d18
Commitment
2c4cd76630e8bb3916687016a2c31680c2496b90fc87fc7599117580c4d2297d
Range Proof
672 bytes (Bulletproof)
Memo
8678110331f2a7796e445f41ddf41c4dc4766b06a930bc65a4fe6e1c6c00e49cd1cd8ed3638c63f7faf703945bc99520d0ebc3082577a24affb66f7f2054398bd2dac54a52f136541f12560357d4381a20ff86dc83151c4a9899d1809c404a9f4f54f710449775444a0e611ca7d498eb065c4d8183ae1b1bc9ecd142d8624513 (encrypted)