# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
5e6629edcc41d0d5a53289d832d7a18b1d2d63844426af1b69d0c906fce1375c
Pseudo Output
5691af301869814432cf07a1838c47afbdf0f2628cd8c695da7f91a09267ff16
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
14bf47956ebab7593ab0c9a58999703df971171c5fe06c5dbe2f34268d69f965
Commitment
cec6408d81037f21b7bb29702dc252092a45c5523864d75101fba7663976ec61
Range Proof
672 bytes (Bulletproof)
Memo
696dee2289d9ce6a19c0a7c7314929741f04df37abe10ff4f5f5760b2a54e1558d842bb3ac04671ba18b1e61703ec256a7c2d7c11504d270ee06a0f28ea18571a92211b789d09e5cd5b02f57bac4726b5ef608a648b734c585394df5c118f73879f2fa23ac2a72c6702c259fd1870af5a5158a922ea2f0ea392786e8e0c516f6 (encrypted)
Stealth Address
00dfb0f683a9806e3234202ba3d1e4db8e39fa001c4551834c4509ad65f93c25
Commitment
f08e1243c17d3aebc3e3e936b0706a47e87e997ae546250f8dec180ef076e143
Range Proof
672 bytes (Bulletproof)
Memo
65fbd828f064d7551c3809694f4fe5397f3bec1095e2047794c6d127a42ff1908ec36d1542bd3b578a163a960f01a22b61c760074634f6d9a33954c01570ab4567f8f077718a746722b0fdc9e8a5ce3abd74a5a3791c9d9a6c77bdbd4fe35f653245fe6aef98c3da2efe3e5db4fdfd35c805d6870c1174edb305fda19a90b1e9 (encrypted)
Stealth Address
505a50aef37680fd976fbb6c15a4c149b5056911eda0cb51cb7a840988a8a162
Commitment
ec9caf65fdf44051d636ffee609b6a49c2048c32476ca02eff06512cc327a66b
Range Proof
672 bytes (Bulletproof)
Memo
27e2693e327fa3d1c09cbf30e0cdaa465c12c84f65a5538fb04067ce359e6dec58576d9f6107d8b493c44bb086a0b39d40d9068d305a4f5436a59918d52ee9d2da79f1de6086341a76d2b5d0d4ac04cab701a372783a5045bc517d8bf7d3c59d4b50b65416263eb7969b105910707c54dcd326ac2e211030f0bdf6db1a4406d1 (encrypted)