# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
5a500403429fb5ed4f467648471f8b8618fa7bca5e4e3d7646395dfd5b7a921a
Pseudo Output
4e4c5131beb2d3d331e34bdd8e90e8bf972383ed182db950091500db7332c160
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
8661f4acd97425b6af8b9f29b6e109f2d292b8345dc22021693693f72e429011
Commitment
e0e2d4a3cb7bfab36fc6d18930490dc68ea5f785a701224e8defd14c46c8ca5d
Range Proof
672 bytes (Bulletproof)
Memo
19e756cbfa26d45e5ea8a9866d30d5c82682c08c5c59431be46913df79b44dcdc00b32b0744604188b5dd36c39fb5aaa64f3a71db61863165860d01ad4c8508971523719af419bd2f5265881494836f41569c4ced172e96e3d0fb40b68286a6660532649f26a813a79c864b38f6bc43b2f17f3de012508ab8e2a04bc7e199143 (encrypted)
Stealth Address
40190896fb0801bb203687a4074bae7579f06a36b22bec2a813c6477cf2fda22
Commitment
6ab5c507bfcd851024522b09f0d897d997aa13966bcda14b41fa801402201014
Range Proof
672 bytes (Bulletproof)
Memo
efe85b9074ce3e922f49434e2cc3b456e009028d4de7ba3c0fd77b17c6b36ba1974d499c34f78480470e52e3110bd5f2dc68baa70ef12c72b1913f8e3214b40db91da3ae3022d508f3ae315c9da75205f09cace402d49d80e7f5a236a8de25014f9b6e159712851145ca90b7e5d368605e827f9c10e76ca3ec2b3b33469e8291 (encrypted)
Stealth Address
5cf2f2367c5768726e441efee1d69c44f5e47b5dec98920bf7fdbb10a8c8d502
Commitment
d6a2c3396fbc3ff5b321353c2b28ba2b8923415988a0ae9a3e30265ecbbac02d
Range Proof
672 bytes (Bulletproof)
Memo
9f8f913362708102ac12b9951bd32c187928978b9fedfd6da40ba9fb23fb6aafa474a23cc967801e489c5290ddf18628d175b911c53be45931c826f069d7cf2601108e6c466223bb3567337cca7391853d645c0d5766f0e0eea5adb67f420a44c97061760d99df27990b4394299ae4857656e5f8d1b2aa99a4c44987b19bf81a (encrypted)