# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
0265c802a7668d8c941d6383c8b36f05166b4c2859dc92de71e83f3323068277
Pseudo Output
560ddf66eac76b1fb34a0d9febb650e84cb1181946af37edf354d17e24f98a4c
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
d2d3468cf3efc5dec1aa476080f1537a16a541782b2354eb1d6e6754eaa74f3d
Commitment
0a68026b3654f729cfbd73f2243d033054de4260de44cd50086b23bb8854d219
Range Proof
672 bytes (Bulletproof)
Memo
47cd8c84419edad786a15ccc1bbd3c0af2ebe7457cebe23f9f10a1368e49f3cc38a67e34fbb7ba906635928d5ea31c2b0104289ec4d6d4f71172c80a20689e187de39c92158d22a0e06684fd0db42008f0fb92f10ea26e7fd145d849bd5a0e7c32d678efb6d714eacec20cb2213b1f01548859b3a36c3f57811e68d48fc45417 (encrypted)
Stealth Address
f6f3f4211b7e2fdf59b893101050cd27b10a0ceee0602f2f98147965e01d334e
Commitment
0ca867abfcaa8fc31bfc0c8fe19e0dbc3aed9ea056c4ebf4df567765402f7176
Range Proof
672 bytes (Bulletproof)
Memo
86685a3ee9fda735cc19b0b9d74e5dc72763a84cb5615012f646131a4ecf11695cb87e7fd4e95dd613413185a0b2aa6d7ecb6430ce869ee5c2470a8b8e12e50ba003f3352f6c81e9e40c7bdc128327f584f5938b23ed3d04ff367700abcf2f566a7c7ae563e042c14bb4fd6adaa5764d11e220c323314a8000bfa40aa81382e5 (encrypted)
Stealth Address
ea6ebe9acbbaec7479ffe3bf370c5d983f885b69fa51d3c27bddcfc896aecc4c
Commitment
fa022a18ece8d20ac22fa9ed501c4a854f5d04d783ec4082cd18285522209f3c
Range Proof
672 bytes (Bulletproof)
Memo
2665158729d5a0a6a6458de2aa73a86a9d215a92b79d8ea1775daa045d9992cf3ae4ac2885c2ea5cd8fd8d4a7aeb272b2327b0a5ae17bb7606d7c8ca413ceb7ef236ed53026edb6b08bc1554f3fbd4bbe1f9826c578c795b0f7cdc6c331ac427b0d887db05d9a1941a30c7c1f895f2a99f59134233fc38decbfc72e665b83239 (encrypted)