# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
5a9587df1868b65fd27032998fb324a1a443887a4592a863e496154cfbc2915c
Pseudo Output
b0014b75573c907fba0971ca88536b86b5f006aabc27d9b53251be626293844c
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
c0fd625f7fa83239c81aee2535ce0d137b01c5a969ed75729f94cc8fd57e8c51
Commitment
6473b2edf2d2a865a41f451ade72a8bcb051487881f62203cd5dffa7a149d13f
Range Proof
672 bytes (Bulletproof)
Memo
429e1742553b7283e8dca6c9204a4707b0ffd63a3c0c7afd9c67f914158ff72b123cd30146be7e9c3b1004c88c738956a63d2d7cfb62cca93b399e808ed036a1282343bcda0ae268f7fd324c059a7f9d0b73a838ba1ab445fba37ba23a5734ed5ee9a31f07c52558d9265963d302214dfac5d3e688efb303c4498f4014568726 (encrypted)
Stealth Address
846a6aa3550f0ad0d86889f6a67c3ce7bc7d9759620740babbb4bdcc86210a3b
Commitment
22d6482befe1ce96602b01f1f6010982b6401c509071c8ac990cae5d17a7182f
Range Proof
672 bytes (Bulletproof)
Memo
7a5bbf71cf414121d31cd4071c5554a10953dc2a1ab60a368efffdb35f885c8a2433736e6120f23ad6062bc1ae57c99850500b1b58e9ed24016e5298052a53cc376cf375de7d94c27da88532f844d5ae9d59ca588da94d5be3cbc42d91b0e6ca344cc2e747f9afdef7f18af484607a34bf288abb5a6da11bbd25be18fd4f996f (encrypted)
Stealth Address
d030e7a77dd0e6994dc08db7f6da183fbd710d16ae628d73f9819d4d663d1c61
Commitment
a2c432aef1874bfc0e95821e148cb750c2e97487cbd79647ca6d8e23b6914136
Range Proof
672 bytes (Bulletproof)
Memo
5065545c87895e329fc77d2d101b2769a1ab777adbf1e28088563a5a5f9f987ef9629b5fbe8a102973b5a73fff98ee5e0193ebac1bba2a81fc4702c2498aaebeccf61b1356784af395f1fc904953352a111ce1c0943d674a10430fc2d90bfa20d1c0fa9cee430ddf17b0443d241c99ac844afffe37cfefef20cd449ba1ad0868 (encrypted)