# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
227913e403ac35f22867b088e885916967c1a639a72ab5b33942a3b9d5950318
Pseudo Output
62c71bb024a7d403dec8369687945a74e420280d8fadc8b96175bd15ce2b2820
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
f03977d0f9136340b85d4920c4c58631fb8c40b07ec1e0857acc0f5a571f3a0d
Commitment
9a01f7b97679e1602d19ef1b264deadd964f9f69ea8e235716b7d9c9f0547e3d
Range Proof
672 bytes (Bulletproof)
Memo
771a495c53f19a76f15936be92e4be391362666d7a38e5afe453e06b1e348846ff8b558cb37e2d35a54d0d941952247ffe275fca7c7d4e0082254d8df45c12640e7e9edf3ae5b511b0e3b41d911d09156f4122a2f10dc3fa1c07b7789cf39fc3c33de176d2bcb295e669b0205814b217dde71566f683ece22ad6095b4d35388a (encrypted)
Stealth Address
0ca19c0d27c8014a1e3e7361cf0f7fee2cff22a165282457410e524a922dc739
Commitment
c298f2f8bef2b26af9280bf105db0ff8394f6a00e9363aebc062c5896fb34d3f
Range Proof
672 bytes (Bulletproof)
Memo
f336b02dcabacb87defd60a6c0ace7123d860025a255b921d717e1d81a0518d1b9ef66da3811bf9e270d053e3faf1354acccc764d31c4dee90ba7bf68d77683d96f673e0b0940194a712dac34b536658ed32701621164e94ef91dfa7e4110271efead378558388891708669a0ec2302c28aa869d8f996ca00a794a6e6da7004a (encrypted)
Stealth Address
f0a2277591f3ff3ee2b8ebda6595f3e5548f26ba5dd00ee40fe0d178557e2f3e
Commitment
008362947de57a61d0dd1c8d5be91d3ec272d752b1ef5c8b731b1dd892a35d0b
Range Proof
672 bytes (Bulletproof)
Memo
ceab2f3ceb62c1f9e9d25bd93cd515348cc3493743ddd198e66bde72aee77a084258eafed5f64b930481296f5a42e93704a5da3b427329943c9265afc8efcc696b1eed947c3c07cade622371e1dc70a5c50a0d0cfc02cfaa08b970a5f2a80b061f7cb5e7451c339d994800572f062c4f03daae3049fb3dd451bd4c2f5e8acb68 (encrypted)