# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
e854b4a81c9fe99900585af4cf99239a548a3477ba4bf7d31975a3839d847d5c
Pseudo Output
3a97ffb3c7f05b368681461bb74b5c18ba8c8f6abae993b2661cbd1a24490b60
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
d00386c194cc257da6e394cf44c7f5ae04890d12b5551d9226fbca39f7e45c63
Commitment
d82fe9b83f7441185d8e201800c738ddab7d0f4f969725c29b2b3379bdb54f14
Range Proof
672 bytes (Bulletproof)
Memo
20cecf7d7ef3df91a3114dc3865556a9bf3b5666374b8313126b93de2c529247e72d7255d6342b056ab8bcaa82ffab9c1bca5751d1ede882a7a98a3523e5ae8e4a00463129d368fd4cef5520e68400d65649ec63cc3914863c64ac59fab5a0f8ee33bd81103acfbfd8b0915511c7ca7ee0685539de4f6a2eb4a1e1d2833163b7 (encrypted)
Stealth Address
58cc3701a862b6643771054124f7ce8959c95818f68ecbdde045fcee3192694f
Commitment
045a9842597250ea50a5ecd6bdd9794dfc7e37ef055827fd9b87dde6dc34f86b
Range Proof
672 bytes (Bulletproof)
Memo
ace56d7012a844ce3cbb33405e975ef605cbc9db99da5c7a161bc448df63d5fdfebe461f3ca266b466f2a3dcf274554bd54be373dca4a6697becd12099031fb21db475818330afe25857e6a5d3f48bfca546830464b6aa8af20b06c864bc8cf70be3052cee9046267ce0cc44991a5482732b0dde95683a63c53fcf3c1028ec41 (encrypted)
Stealth Address
f8cad2a21ed9b0c2336f57c7775fa64d69459218278e517bd3786dfabda4865f
Commitment
beab97f6b99cc379de6dfd034b2cef8e2e9ec9bc711ecd39660b87a65128020a
Range Proof
672 bytes (Bulletproof)
Memo
df9c53eb725fde0855dd22aea0b673067e4f43dafdc3b446e90ece1b2f7e67037d63bb16b6905f2d9645fbdfe760080f40a972f8ca9632532c4935af2882e246c7f51df96bfbff64039a7680b9b081aca6f5beedae9c19385d753af1f58dc8128ad6aa88763c122839b7a861488f63bffce61849b78a65b2c4ef0ce08cddf069 (encrypted)