# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
561142a29024d6545ed60fbde161d793c19cc8def198d5920ac067972747d115
Pseudo Output
f2563d4030c80dac3c9ed8b448355b38b825a10a47de2f03af613fd8b95f9666
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
96bdf853d2949cdcee322681280083e14745fddaa1411e152584721cfc726567
Commitment
d0242423a8063cd88142fcecd6e1a01c13dfceb3f8cf5e1b98bffa20a7355a0e
Range Proof
672 bytes (Bulletproof)
Memo
8ce5531a9acea304fded457cad2c78e2ba0a36c4cea6e766d9611ca91a095db2c18169527344451dba12a3d9cac79ba6f4164a5be1997bf66e43b20b2cbfd6f7d53758624c7bee29c183712016510836d29fac4f7ea3221b8b1b4e304ab7f3d804589e7eff1f3c70de6269abf3d4a3d74a8b56a225b2653c9c0a693da4606ae1 (encrypted)
Stealth Address
66cf83443fcfd364b5db250bdac8fe3f302ed8f6bca037b7eb45453722b2935d
Commitment
94a69dd84de2f42abd0768c56706d0b2aa785f0a995be924c2d6684ccdb4bc6d
Range Proof
672 bytes (Bulletproof)
Memo
3dd38c9096f5b419bb678103409d5422f74ae71bb4e40efa3b95a0bca4dd47a321f35d0f545f77deaa85bae17f1e1983ac6f48c52aeed5a3e70db537f6c7faa68f65ed4ad6804b0fceef3ea53c61318ae99929c5c6e07157e8294794f0f9a282507d712ba370ff7d2ee113eabae59acc1907ea7178306f723abc2e5ccb07dc8b (encrypted)
Stealth Address
ce414b9af45062794d5dc8a48489c5946f4eeb8d8af9f03e2b89ddea5c4aaf44
Commitment
fa7f5cf37d0f847c81cdcf8e147bb28f0fdfc59871c5e9cc1d0d5d24cb92126c
Range Proof
672 bytes (Bulletproof)
Memo
6f206ad27d7198e5172ade615a69cefc92aaa7fc46f846f2f1c8393f5d4a6c6bde77f090b298ae36bb3435f1597f3d96fce450e27cc5084146681f4315c0a146d64d3a6eceefa9e92e06cae7c8207e32544eec980cdd07691bb31852e7b8f3a4a1a73324dc08a9a5c88a1da4b7e67e12dda95df0f54631cd10dae6a0cac4b3b7 (encrypted)