# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
2648ee535b8cfd00f3539bcd3de1266cecf3baaccbb94002b82f958012c39837
Pseudo Output
b2c633a75a1678e90b35a56569f765b25487efca74ad3bd77b8789bcc4a3476b
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
26725f22119e6a9e5b4a594483c537169c8d046dc067d278e0204f34cf681430
Commitment
ae54fd5ec325b197f2d94a1671d5bf48658f4b61c2d421c9ffba1b07f3674422
Range Proof
672 bytes (Bulletproof)
Memo
cacf75bf5a2f0e984659a272d79d3b3f2ec7de83811b76315f8e5bcb401db7fe7a32c475c0e37ce0c4c671336ea715039851bfce27bd377ac88b4c84250b77595e196d1ca5e7565af55b95e9ef5fac2dcbac49a42fbbcde7fae71d9d6f0f8ae6dc6ce8fa94930a2a009ab5177c4e0dadbaf835b2890904525d566804c102c1d8 (encrypted)
Stealth Address
9cc4a72e1435d8ee59dacd45b1e596c1a5f9ad4c87d3efe3a84f04ecdec90337
Commitment
78316934402275fe17d64693970b3c67832645213fc9fbd3d0912c7a3438441f
Range Proof
672 bytes (Bulletproof)
Memo
eb34b8c7c734bd439fd070436c2c872f792a661bfe73017225b1fb4fc5b15f18ff3cc714621ab5099e7701b53dac0149e5c5f1d7504ec6b83d2488680383efa3d9d9093497f10de11d2e1bac719af89bc4ddfc2ed6d6c48a6dfb90dd2edf034537c9b7e604b5c8f724dde7f79090e35a46047cb34ba80d17cd450f6f2cf904a6 (encrypted)
Stealth Address
e4c1b5e607b78111f1d9862fe7dd1f19fadcd6e187e95be01521f0198d84d36e
Commitment
42cc005df4f6c0bf3733d0cc4b7a805ceec03cb55c9bdcd3b1a3f904a7319947
Range Proof
672 bytes (Bulletproof)
Memo
7485bfd7073a17ebcfe6daa10126f0572af1acb4983164529a6e0780dc82d5c2249583948228038421f8cce8f79da9b0ddf0db61680ec698df8d1945964899a2a861cb3a336e116a8a46ea836779d6c5f48c2a4c061ba7a4bca1ff8527eed20699380b46a0164a3fc8d9f6e31e912651539d817a8ad8474391363077fb1122cf (encrypted)