# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
c8e6cecc9859f27be265e6a47effba3e1982b524ea13c2128a2fd55c2139ef67
Pseudo Output
9092ad2112c31e05a1e6754ec3c6b4fbae71c480dc11aab29237682f10812305
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
064918f75d67edf55ad0b3e1e3d71c1dd12393058d6cf7e137595844802afb14
Commitment
840ad69d9d49c26df28f517a982fa8a34d06f6e7d8674dcd82ebf8e806d2bc63
Range Proof
672 bytes (Bulletproof)
Memo
16defc77a3ba80ccdb3796e4a25c40fd07813ff52837c2e251faa7714c1637431b18df0aa0db04585d65e8fdd753db99b21529378006fdd81841e8c7d8848a02ebfdd0cd50edb1966ac04c3d9b6a062fc26a0db22f0293eda80b2584fc3782b9627242251aa71339fe3d9e79e95ba95635e0a3f0493df4be7ee6b3653a31e9e4 (encrypted)
Stealth Address
72d7f4e2d640b64989cf59e4ce950c3b054fd7f052404dda8900419e4bd3d009
Commitment
7213e45e61ca83496e8c7c6fc7c618bfd9fe7909842035cfbf46b770b7b08108
Range Proof
672 bytes (Bulletproof)
Memo
805cb11dbb94411141a74fdee9e3338d47a6898b2086cdc49f2219b1d991a9494d9f885d15352808fbd0c88e2245954c0839a6af5205193f88b958dc2d2955abeefa26b2e48350db733c3192ffd1b05b63bce9e853886cc093599831cbe05a14ef8f2d9e1a9646ad384a232eb4e2d24ab4c88da269c3699f9884daee01c610b5 (encrypted)
Stealth Address
d4ff831d7ff3f1fbbda281f8afa0a636d9ffb3b32cc35dbc690bda860a4ab303
Commitment
2ac7dce880ea6f15afdad29507053a58004dad23cdc0e680e42e025e2f38fa1f
Range Proof
672 bytes (Bulletproof)
Memo
7ba40ce12722f1bc23c130355c8c68a007cf55fca888a342255b6b4c7606587754fd05177df22f69a0d1dad54140364ef66e18af0fe43486e96bffea174861ae77e1cfda5f270e5aa8433db727eaf879d8e927b3e54c93d6d3115ded2e70b4dcc9eb905db1ae3d5d25b6afb6a7643f1942c71496c1870cdf548ebfac94f994af (encrypted)