# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
fa2160bb299d9525d1d213a25889fba18fc97d584e388b1142f9d79bd1825a1e
Pseudo Output
ce09718d752e1c8f194f99f82202e23ba698306be60a5ade18d5c3ca63667531
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
90ec1572b0c2360b60e72eb71d1c982f0741b2ef63e6a303153d3a56baebea3c
Commitment
9cf0da0d4382e64e4cb72d2c13d26096666ed935ac5f4e8997ddc50c7fb89f2f
Range Proof
672 bytes (Bulletproof)
Memo
4dd25ed2eee67e379b6611320aaba020f89264297131d1501a3469d8b339a7390e04915d5db185d93269461d3fc16dfb5f81805c995ec1054edb3f703f3b428b050073247d5e8ba26b23ac1b0c68009c7616e4d1614f57b640825cbc0cc48ec94e853406100268c3248ff6c009f1898ee3ec0d9e27543b8aa644f930ee27f643 (encrypted)
Stealth Address
5ee616ee317e508995d14b2918b78c133ce64c4a0e09f4a52551965f46567116
Commitment
6eb262eae3a25d41842aae22e99f73759488d24fd60e002ad3a0613b3b2ea925
Range Proof
672 bytes (Bulletproof)
Memo
0a01fef4891018fd537a8ae85d5a25443dd2e20542624a28ffb1fb339ca28d3fbacc3a70d56a87167ed259041f71f7d39db362799a7e1241ea2b095989302f889a65b08a9a560177349ab6eff473c2f80993df9e131ab45841bef7e4eaa58f2d876369de9b6cce5a1a81e84d393782252fb29793e17687df5db3f809a2544214 (encrypted)
Stealth Address
e43a5c504dbf57e799aba11f318544fc4dd9937d78266e5e356b1eae13e41d41
Commitment
dc50ef84c0eadfca4769ac54bfaf88de299350317ca716694e3c8d42851be333
Range Proof
672 bytes (Bulletproof)
Memo
8f0ff9287d705e3b4c3c29c1a84870c68d09e140852d6ca304488093baf94fcfa029970de50f8563c62ae014732ed30172d6299e15565921035cf0ae2768e4b6cfb671e1299640607a5a1fd3120ece12dd4a8e66843f79e39d404b852b92205c0b3ddd24e98fa92e0d312632e9f9bace389f477f6779db7b0f33d32b05e87703 (encrypted)