# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
76fc1cfaf655bba75bc1c2889630636515f15178947b101a83419bd1567e1f41
Pseudo Output
1277636625d1724b6abf3cf9bc29d4c365890e985d9eca124ddf0db5dc186e14
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
5c4053d5c4b5e521e291a0c4d76fc493939420057e94ddbe21841b5705588361
Commitment
f2d3c2ca41a0ea2900f5798b240aed02ced9eea4d554f8f0036b7e4411ec9e69
Range Proof
672 bytes (Bulletproof)
Memo
5af93c76843aaee7b0c5b343efbc986bcf4ee44466c8c3b7515eca232ff27125e0836dd30d69f996010ea4b7fd9d9a4c7f1bf82c5d27d41c34098825ad3ede2701374b664e5a20985e0e4185c5a63c52768d4a026555881abdb749d2ba3417079fc984f710a1389717b9dd3a51a182f41bdedbac03784bb376a21142dce527c7 (encrypted)
Stealth Address
dc44076790e5863eb594f312284b8b86479b6d674e0738d7add9470c00561d0e
Commitment
02f48e5495170b8dcda91135e09b507a9f0c205fb33a6179bdb7f23955254918
Range Proof
672 bytes (Bulletproof)
Memo
a2dd81a318b55e1fe98b15d6749a64a613fbde6ee6c2db9e7904aec9b3f64e1bb2f763eded89ab3f3ea2087204638dccc79f3f448a0fa13438e62e5fec8505b9db681c4c9a036779a74389c00de19133f94412596bdb3979e5e95ba61b33a31c22380e5735267278eff6daedc8ebfa39a562dfa8549c514b97d0d249b647f066 (encrypted)
Stealth Address
6c16667edbc98fc9bcfdb1b004e034653354208d4da6d92667dcb73a34eaca07
Commitment
40c6add58fe9223e97770f4f49635a8f957986ca9da491fba00e8f4b731d3b67
Range Proof
672 bytes (Bulletproof)
Memo
6192b1c6b437c7b048b0a31655497e210af45a56925c9d0005a1acde05240168dc8250bc31a51d95e856b498b0b9a3c5bb23cbbbbab27c8180de3f409cc5d512dbedff2b82779cc731fb4a5b1d09af8d791528d1f6ba99070e29dc716e6dffeb14753face8bc43f57682f76aa9c9750b6661f269d1e2c49bb0f32735a363b7ea (encrypted)