# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
c27f64ca522af42e986ea5c92b37012a6a80de3d3564dc8e9fa36717b8e9456f
Pseudo Output
e6e1449946aa5be1dbda459cd63dfed5a3079f66b55a2a870ff21362324e950e
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
028ad096aabce083a9dd147fae6a11d58bfb270f176e07a2c5a2eb48a902d417
Commitment
027476e6c69f40549d810f4a4cfcae8fc15c4241cf8f75dded3e68c2ad1c5534
Range Proof
672 bytes (Bulletproof)
Memo
729b9466392567b7edb396b0d811e7c01a230f3626b6b5d74db52c90966079b52388b076c11d8f79bb8a2c24ed0bf4d0d7ff57648c0589a35a8925c7a86baaabd8ff8f07ee5c6caa57a2703d57be8a86b856eda034df835a449f3fce00869b1e7283c4243c8074d9f9fd6854490693f95c51c8578d1d34b2791d16c0ffe63a28 (encrypted)
Stealth Address
ac6fec729419ac55e496ad96a5038f31f5f9e959f704fffaae22bdad2f30c410
Commitment
0ac0f685811dbb08e5fdddf180fd5ff326c1b74e27148b44d2e10618423e550b
Range Proof
672 bytes (Bulletproof)
Memo
d88e33d638a00c60d06a5f61b6bde3255ef6e86eff82b87296104171926d1714b54b0d05a6599700e66eb71a914b3b22b0010b741bd29728f927f1a54bdb9bf39f56d3dee567cceda2c82367950d87558cdb2eb67655f0dd9b870ae0051763a3c37df1a1ce9b225cc50abc890ddfc6118ff10d2a403c8a042e6ba917f97edb61 (encrypted)
Stealth Address
00d0e7c88125375d9b5844bbad264a86ec7917e1c19e8c58eeca1674f1ccde29
Commitment
1ed6f0f63768b76b1c4c3b7041eb857e71fee261ca2794ba631c406be7de6565
Range Proof
672 bytes (Bulletproof)
Memo
4cf0491f26ab80bd7e627e99c96406b47e6fe2fa5eea3710933b5f387b1829bf86ddeff499fedfaa152562391332aac92cad10f1ec030b643f88b9b99f6c62d95066cfbe3e1f10f30f5e82d0a1b87a27027f486bdcc162f7b5195065b8ebb76ca77999925e1fb9cbf2f51fd50f50c6ed5e8d2fabbabf0298fd76e27ed7f10528 (encrypted)