# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
e8818f5697d7838ef487afb149374701f0ffc8bab6fc116d4d88d82af8a06565
Pseudo Output
7cd97669b6f37352b164f55499bb7e90aa80e539a312be255ccb5857b465792c
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
7a7331097d7281119b4e85faf2b7d0442f1afd7bba1e8a73f30e402d15ede650
Commitment
f22d89d9d03bcd3cc2215b0f17c6ecbbcba316d2af28ba6a9449a2315ea8eb0d
Range Proof
672 bytes (Bulletproof)
Memo
386feb6c01da9f62bbf4c6d01284806e293e432f5a175f26db698d2f5b2ac4bc500e89318788e9ae15e6ec8cd8c692c029264800645a42597b7d2a1aee68d2255274fcf0518e072f3ae4cb75725d1edddb3cbd03720a97a7bdd1c3b279d51a3c52e09fea788c2b97bf259b01e89b5a47ffc7b3ff829945c86b63ea1ba3e6c5b2 (encrypted)
Stealth Address
3c9f278dcd6780b44d700bd1da4a9b12b5b0289c1998ed083334527412d62623
Commitment
bed922f896585e0a9ff2a69954ab126afff77a71a3d0638b15680a38f22cbb13
Range Proof
672 bytes (Bulletproof)
Memo
4256cb4eb55e27e0be065f9520fc0c214bec6a97789111ea6bfb417e1834901f21f0b2d563083d45786bbe79eb951e87895526c1713d10a80ae1ee871db5407c2eccc5fb12e4ea499ce922c7f016bd66d0259148db2e6165df64571b84447c3caae42c193d3e4d72dd4138ae939ed5d8755a1f4d449a02731050ea8e857e4b28 (encrypted)
Stealth Address
920464bb847bfcdb691ed6caac4c9236c4fe182b635ce9e0e6e26c5201b87e2f
Commitment
f868725fec5d31c7844a630d4034f06cfcd1771500abd5fc9e37525ea422d34c
Range Proof
672 bytes (Bulletproof)
Memo
51232b7d3b23485eff395e6ddf29926a08e1acde732abd97fe6561e16bd21eadaa63b2b10f4b2418571e220fad2d2f0372cb834864e0d33a482e94b737ad6f18a66bdfe39b35b8fc667705a7bb1a4f5fd91e9a0641e15fe9ba16bbafdc169c96ae2d34f48dfd27cd4743287ebdb290cd12f2e912344fc8ba06932b5396501ad8 (encrypted)