# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
9e3e1f9e9c167a023a4096b787fa15b59687d45507a97a2c71d37087324b083f
Pseudo Output
122893a3c43589fc1fbd1828d14e1ccff4566c19f0056bbaa30001a24c81bf25
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
7a19045e9e4e4e9ca68946af1c61b812c9883ef94251057fd663299143500d1b
Commitment
c83c42e6700f77c05cc127547c8d2521b3ca21090d7a44d3d84c81577f7b8b7a
Range Proof
672 bytes (Bulletproof)
Memo
584223c7cde463587b83c370c2d5c48f2b79027db8e9b9e4b58d69ed22b9acbc3864c273a765c099a71e810673e15058f8ce43b169820543e8243a6bffe4ee399954270b72dd2b7dd44e8f85ac7178596db7eee4d7ef7867b62ffcce4ab0641068dd7fd4c105cbaa24bec04aba36cc7e68150347050efec16a1b07f1e91dbc24 (encrypted)
Stealth Address
0cb4221e2aff2c7be1ae34e78e311f096b775e7973cb573ea3674a9cffa4ba15
Commitment
d6fd47ecd91b60f9fd52910ebaeaaf935fdd7a6eb99dcaab8f0a739e084ff20c
Range Proof
672 bytes (Bulletproof)
Memo
774913cd254e295c1c4bb4f3668959590f30e8f7c0bebce7e9ae12a090e324dcdb4bd653f6d3f26c4411387500eab848563a70bb128be473c0c5eb6ec29b22baf651ccdc91bd34097e5bbbbcd3af68839fe6d8241f8ea68236ef433152edff9e490d480ae244de1d5b06319d8c5914cdcc35c3eb02315269f0dabf69366e1a8b (encrypted)
Stealth Address
fea41a0151f2c0fc712fda868099dc9b63c1f8864e8d9a0cbf831b365fcc5074
Commitment
644f9e9b885338366d88c777fbddeb5d5d12d2367c47e99e201d8e8d53fde345
Range Proof
672 bytes (Bulletproof)
Memo
34703b6551b30f5f4898c30e4a8e5bc9c73b0cd15a7fcdc24d5ec1b7c248ed3d3d4d913a8e71c74c403373ac568bc220081913e89ca591573293dbbbfb3504d60b9b80804ff288b9371c2de3dd3a49cac52f137a5a5d321707d2e515989b63cba290abb21cbb0097e99eb6188ac7c0d54fce5b86500b5ead8d2a385b0aea1999 (encrypted)