# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
221f11c872c44aed7dee62ce9f144ed32847124b40e2d0ab73f6e22a3c43cd41
Pseudo Output
a4e373dd642c0973e3264ced495adae6dec69785ee4248f07f7865b2670ca604
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
76a0166e718bd3af1e1b76bf1ac9c99fe46a880fb0fb4ec80d60349184df3b61
Commitment
9e2e1ea1e46dadbba468df982f1c15f874b9406d85e087386d95d2c9b133475a
Range Proof
672 bytes (Bulletproof)
Memo
51caf3cb701925101fc4501b721082de3be47beeba2f036bbb8609a898acb63795a1ebd1b7f45c49634fd81f844278ebd96d3d42861dac3d241c53d526049cdb57affed125824e6111d56fd0e41bd5af411e6d79a1b9f5c40db80369215e18d6763d76074581c0ad00c471b7ff7f44017d4a9d46f88b4a7f69dfb262792c86f8 (encrypted)
Stealth Address
32d8fdf68417c001166dbccf7935e219c4b99992b4a9c89cb560b9f9e449992e
Commitment
322323f9c2b15e41933411c7ffbd47b443acaddad1df7c14dd67c47f7c97d261
Range Proof
672 bytes (Bulletproof)
Memo
672befd81910039e63d4b814e957ad0228d0fbd38a708cedca02e8691dc8d999df0dccd2222ce6e1d6e8ee1d0d28e83177077206f9d6bfe44af85d3a65817942a4e20b6809cc34ea915e4ea42a5fdcf2e16a9b55dce789ab2d62cad31b719da86881bce6e38070c36fc0a44447788d7b6caea39497814dd3a61d8a3fe5e0af0f (encrypted)
Stealth Address
b2007cb76defc5c660ecf9ce5618ade9cc767a69d0d5042ae9a2fc4251e0d351
Commitment
ecab0430881e1db86f1c262713bfe4fef7e2f1f36b7370a708e225e683824413
Range Proof
672 bytes (Bulletproof)
Memo
3768992c9480d842a636c332e9c292293a0fba6777b1058a4002edb2fc1471eb7811a82224f01c946eb036df89593e5ce894a0642d24fc60a78b791b5a11d43ff0d45e9102ea317127032e96c0d8d2af4362bce27b3026dc456fdef8829bd37dbe93af4c8b488bc8460393cf27be62df723214a43864b38a658c410fd5324143 (encrypted)