# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
ec15e228784b186bf51f351a45ebeca30c470fd5b3b79981f4f5cafa540b0b3c
Pseudo Output
78fbd249fb948e3a544a13b5b901cbdab74de250df9b006c6895d90c21edd733
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
886ef808291ed8acf0613c9991123f3742c5d86d72cb7ed9279b2483b6d60178
Commitment
96d69da2f10ce2fd1b5ed33a45b0d62a8a6ab232f85b58108f2f2e6f1a4bec01
Range Proof
672 bytes (Bulletproof)
Memo
83d9f494571152f6d8479127c643ef65fac29d5535c043be73a7271a071195a6b7ec23b0dfda4262ef6a6a8d0dea3bb64a1d581aa6470afe33e16653b6b3b333f3187f61be9288c1eb7114585b2c230bc148569dee9c03a8285990b8ccb9712696c907708e77075e76c4a592f9ec5e1aa0e58462838ccf8052c3f858ac659515 (encrypted)
Stealth Address
fe6847d3f11782c2eb0f827192fbf3a462c5b7896f89598321df945447a2d757
Commitment
bafc0b3f273d0436ddb97594e6c36b492631080a8fe0ad2cc2b5f32ea541ce4b
Range Proof
672 bytes (Bulletproof)
Memo
4656915966c5fbba741d2d5013bdc1d59bbd71efafd69a21cd322dd2eb3bdee073e592b96e5af9a1036b01fc21084aae88d38b54548a4bba2ec2e376a0b8ce9d314531e995f212e4bf32de8d62cd5517319184bb796cd35a6e436eae1ac0e65640e6b48053df19a69f627a1ee434bffc87d0c848f164087a0ca767505980eb12 (encrypted)
Stealth Address
86a149d4848141d84a42a5fcafbc309b5206f985fb4efa166163df2d011c2a58
Commitment
9ef8b7086c31ec41b31f6ed1c192ecd3832b8ba3c314195f983664c0b1f48d4d
Range Proof
672 bytes (Bulletproof)
Memo
e20e6fb91dcc84978f49b5ba0909ad0d93e6035e96c7d157bd670490d2c1ac86b228fc60ff86857c1930d830d2aa23d64d7ba1070f17bbb3a1efcf9c7eedb5b5c42510fc58aa0e406d7127587efa746bbaf24bb2d5f34e25c84cb783eaf0c986c99c03883c4c0cc3522b855eb2b3f38044c6383237adb3bc7991114c7702bf66 (encrypted)