# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
72cd80224f07c8bad7f913a2a9f7c91810a32282b75c6234db3036963515dc37
Pseudo Output
04216b22b6acb67e8d3561aa1d6b72bde6664edfa01dcc22a9bb1c4cb878ce59
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
f41ec2efdf36dd022892adcd8413e0131da4c171f35ef096a1642bb757b5a36a
Commitment
bcda69f94e609b82ee06829f46bd9b578136f74af1a560c11c50834b7ceea143
Range Proof
672 bytes (Bulletproof)
Memo
172aa0a9544135655b8bcf10f85fc63152839de3e86c55131b30e54ec7c9124010e480eebf56ccfc12edfa89d5606c7e37872838252aa5d1fe60e32ffcef07ce928990462ed11128a0bc0edaf6cc2121b70dc0a42eff9e7730d57bef8268811763d8e6080a2c9755db49056534725fbbdda5fc9d7db3b518d346c3f94be6c746 (encrypted)
Stealth Address
08abebb764c1e358dad865d1c6799b4e4d5266745d468c210c77d93918f53a48
Commitment
0e02f467bc4cff1bb469e92e4452f0d8593a84bd08f632c648553441ef60ab1d
Range Proof
672 bytes (Bulletproof)
Memo
3115d975684bdc6b57e787315d9aceaa8934fd5d3c9a486dcd710003a582a3420677a99fadb9e700a0ffc3f81c1fc945ca0c4715b650ec9b44d1390f168af5b7519a8cb4f1a8158f7726acbcd2f94aa763eb37923e905409386164c3d8909bb5ea30665851e463e4ccdec34177f4e0121222bd7a54c1d838604f97a62fed71fc (encrypted)
Stealth Address
027951314bd9de4e1db43b41aead968cd50f10f21fd380da6860daf360c4626b
Commitment
7843d99e474b9406897545efa2eb860a1c663b6ccd1ccdb6140f7cdf2ab97520
Range Proof
672 bytes (Bulletproof)
Memo
78e549f0ff9169c7c4a6b0c79de0bd13d974afb92d94f7b944c17d707fa4162bfb97814490ed3f24ee08e849862364e2599a481f25112f29b6861257a002a82777915ba003a884e5bcf352dd351a2fbb047eb182a3c1cc948b9df4bdde5ae695c21cf4269c6b23ebfe5a3288f4e3bdb0f4359d15809ddb83b84a27d446434aa8 (encrypted)