# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
263359af2948e2bdb616c3738a80b0b3e8dbbed74e0cda91db4e5a0b5c31ad79
Pseudo Output
fcd2410524083fe59ccb836e2c619fb786cc0a47a1f608d52378f578ce26be3f
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
ceb05a35573ae4a056da1a9c0704d78cb5966959370c7f68801d66d140b05b01
Commitment
5c957bd79522abaf41c4403039dc6e2df24fe3f796346e079f3faa985113610f
Range Proof
672 bytes (Bulletproof)
Memo
760143698474d0b446ac447a072e4f4aae3b0ac5767b14b93d012f1a8d0cad06b66fbf497c283ee49c37693228ed39d8064ccd7e67147e815f81de1701b3dc50d15f46197683948b93027147cacb71d2995da78ce4c816b2b1a26427514b6ef4bddbe585291105133f0a223d928355d8db56447da8839d0888fc12f9c89480a4 (encrypted)
Stealth Address
f0a544ec775a51d2daff5ee6ab104b5c4c219a40739777acfdd845ea1dbd3c5d
Commitment
c6aaa59791c8e7aa0b91b172f4e37cc398d768de491af88d8cb976ca36cadd2c
Range Proof
672 bytes (Bulletproof)
Memo
0f3e00b17a9dea65c8ebf53da3897d4bbc57d886c88eec7eb06502789379bd994b3687a47e542ec098e2a57ac20e58c97b1856a58ad87dd83061681f04002c27ac9a70c3f2f57636dfeb9e430737de601f28e8dbd96a538c176f1e22bc89cc51bae1c9408a1d158af3140fa3bfc288ed7b359f4ea3d027b78b48514fa003f7aa (encrypted)
Stealth Address
9c33ef16d43e10d53db63c9e5a7d0dabbb36aa33994a021f304a8989db1a2840
Commitment
247934230856e853e8c9ac0d19ce1d6a77e117e5c6293db25ef862d43263fe49
Range Proof
672 bytes (Bulletproof)
Memo
e5440e8fe5494a436a79ca7ded8d39f38f728a41214e6b9121ebf1994cba904e7363e8ad479755979d8bef34257aedd6c4effbfc3b17068da92bd33dedef29cbbf3b70f7501f1dacc3de3f3fa6189c03ba2b9078ef4565f6fdde09adc77b89bd95d1f48d11740e2c959ccd6b355769ad408b656f034f2723bdadef57012bb98f (encrypted)