# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
206a5357ba75690cd5645e1910738d4954cee0103b362581829f4d012dd0406a
Pseudo Output
7c962afafde22c45cdb9a37ef28b9dc415c198c14fcceac71d0782402162946f
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
388226b60968b66f474ebe6a58a6ee6bd17774d7b3852f86d1d87760c5ca5829
Commitment
fe339e0981d89cf03dc1cf34636be140ccd1a349fb52ca5930406227f57f4a1e
Range Proof
672 bytes (Bulletproof)
Memo
1ff3e33fae5faf3d160a1249e233dec81ffa3fc05355c9269849145680a0022da7bb36f30d7efe86fd7978d0bd6bdd521b5f812e2ba20d65a419f8f708d9fabbe577623ef4d11d07b69c460ece8a056b8b9d04639396bd81e052ab2bd796c3537ebf1c2c1530649e3739d7cb839aee3c5629a35f205c5f16c17747dc201eb479 (encrypted)
Stealth Address
5c250545f63c5b82d02357c70e41f8bc84355ae66ac9fdc5a2681d83447fe35f
Commitment
5a422f9b62a3331df9c2835ed0d885e91d30f5123ba81ccec8c42a80537bf51b
Range Proof
672 bytes (Bulletproof)
Memo
aa3d7b8bf9781351e5102ef0145e1fa2b74c4baeb7177bf85acc63f751ffe570ee3a39072ee1fdd5ef568cab606768bfc00dd3e8f2a79aabef1f830c19f742d67f823bac149a63eaefb41ff600bd464f80a7b12739975353adcf0b5070ddd0bb4343250171d290313d3829c624384df9d032bce986709c4827b85da42aa568c7 (encrypted)
Stealth Address
3607b85ad50ff4d7fa46dc0074d65977fb2531a2967dacfa4cc918436b030232
Commitment
f2c2ba003c9bccaeaaebd04e06ce2c82a6c8a76086bebb3cc32c6c1a21bede1f
Range Proof
672 bytes (Bulletproof)
Memo
73185a1f89681b3fa981301dfa9d5ff4eb36825a58a337e3f7632363937fbde8353ffcc4e0655d2ba562c44b42d7497e142e0569d600bd0dadce4b34d000a25a2440e929a02af8fef5e9210cd1e60e0231c465275be0557f15d301a24e3aee70a2ae8fba93272cd75f5d65b8e39abf871e3a3cc766343a9a31b7090ce36ab9ec (encrypted)