# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
54f2f32f1dde0a0857f122ea7c71097fd521588743f595650376e7549e939867
Pseudo Output
9ec9ec5e1ac9625ea109b0a8f737497946d41b020ac95455c630340e6a5e874f
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
7c28c9201fcabe5492244366b5eef6befcab5e9ee5248abc2ec5fb72ccb8645a
Commitment
4c98d2abec631cadb3e87762b11d6a46d7a7d13ff946b620f5e635728e5fb233
Range Proof
672 bytes (Bulletproof)
Memo
9fed40e2f35b4770c976eaaedde7545f8a626b2ffe24cb9e0e525a65e7a42295a5d98f9a59bbff413c32945a8748370cc89ac7d2d593d44ec62e3a8962fc7903878d9a11e338fc965104f5a28bcda2e10f0c59daff4585af32930ee90e64185c59f2866e7e4fd9ece6ddaf9ab80799f5f21e9f686177a221b1106e08c298d00d (encrypted)
Stealth Address
76109890e8ceab2506266a70e626d742cf86ebb3b36c63b0b481aa31f2ac9f2a
Commitment
447f6ac711ed23b5236ba27f61d0d947397af66d124c219b1b6bfbfc5fc6f509
Range Proof
672 bytes (Bulletproof)
Memo
46dcaf64056c550af0d7280a870227be53178619c71dbda05f906772f01490c4f7a46cb3b2ed092742cb995626ed35e83d17b75f32053dcb9b4837e6edf84011bfd7397054ec58794e4b2aa8aedddc0228e1f0d58bd1c9d540ce9aa416bf3a9a3bbf4f925b16b80a5a8454c250c4af12798c7861e190d1fc2bb24096d0ece7d3 (encrypted)
Stealth Address
5a294cca66046ba26dfa3510c3476dbbc58429ad125dff16a2aea13231b7ef0d
Commitment
c0324bbfada30da23a3f9dfb025c460753c50c327e36741c3787aee4c72ff742
Range Proof
672 bytes (Bulletproof)
Memo
715882c795e94a5597daf8db5de11fd094f258346cd0acae10484c3db05dfba62c290f47a4dfe6d1772a81789727443a90d59ca9d4aac43529571442a205ff84821ff0a684240ef4ca928f9f9e6626cd463dae6a3bb8efdee4d7637d3b46c43a988c46aa0f8f5c77ab2cdc02e94456ba2395629061d421ea8bf8dbac4d9afcd5 (encrypted)