# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
4066c231076d953d0e961f28d21228c92836ee4377195bcba3e7545be00d0278
Pseudo Output
00e277912ca90ffccd07869f41dbc4c1dcdf684291aab5db5e96c1eb4d139f2b
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
6adb2ab529a76039f6d3b389dc8cafe843aa33cd279a8f5e0692976f8772e507
Commitment
18ecd64a8614cb56940b1f3020a2c35d83bbb2f468f99bae8667fc0b271f1a36
Range Proof
672 bytes (Bulletproof)
Memo
ee307a0ac2ebbd9cbd8c3f333db8f81c67650e349b14ff7aa5e4cbc5aff46f6792099e0e335b6bc31831bc617c5dd0dfee23c96297ae44103815f4e6ea5d4794bb32bb8709abddf9c88f30a95ac6759b0e84ecbacd5cf0f71dd4a2f7635948954ed0a5654027a6f59f5e517ddfb4f365c1f7822edfc66af5bd3c10bd08db1828 (encrypted)
Stealth Address
dcd877e0ca6a6a377cdbb8ed78f228f510b9f6bb64827ad2f4568ea6eafd6c62
Commitment
c84f1210b2ac45456675c03a8f93d1c4b5d5c0c3289070422728265c74470d4f
Range Proof
672 bytes (Bulletproof)
Memo
67de6092fa756831ba44751ca1675ba85e41287f74df137219fb13719b1e5dd4e9ba136f905c3d01ca9806d68148c87dc44c53ab2160625b58dd13728479be5854afb0ef3abc0bd7471a13fabfef38343c6b9ddcb6014ac1cda00ef4bc04339bb0ffea5023fcd30ba01a09adcb09cea525aa3df9617b34293aa2c19b2bbbd057 (encrypted)
Stealth Address
620c0c70d28efd8a62295f006b45d2afe44e98032f91698be29eb928331de45d
Commitment
0a0528c882851841bdc5a862999240ecd7025762b2d58d50495cf93af0375b72
Range Proof
672 bytes (Bulletproof)
Memo
a7599e8c397f92c4f7900bd9716ed60b1aadd1e68288e4e9bc4673763abd0f6ed2e11c235b88291745970a09f2816013546660700a65666200999226889182c8da9addd17e3e2249eef21d53118a46898460118fc97f7de3716a1614a3ed8d0c80d482234654c8abe78ab6b23b40cdd834e536dda2b3c278af53907b7d0c5e8b (encrypted)