# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
da05321fec135c37aad4c2322929633bb4497373d692df931c3ca214b231f107
Pseudo Output
18d06a93ed462ea560cea93a432f324f4fa07e9bc41ea019502aca2113051613
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
389bac05482ad3e0f2d72b1f68a4f64d52cde8b51cd51cc11e0b909c40cee836
Commitment
3e26e46e2ed2c925f6d8e32794ad47cc954535c039bf3e6bb7185c104efb6774
Range Proof
672 bytes (Bulletproof)
Memo
9b7a2c8bc8b89c52079cfce8b3503c4302f73f8d2270758ded1f498e7ad82c1feeafbfd994df4493a333d5ddada7fdc6be0db8042ed869faede7b99a713710396f5f586b6a5533e5322565bc54e193d63a509dc8c9950edc3b48e790a848dbe0abb3bd857b9f105559302f1b006dd6b7d0ce3e58f27619fc79e5e4138767ec35 (encrypted)
Stealth Address
f4ea7e421a0eb2b49aab0ad945ce99088cfddd45c30ab5247286ecbb7e0d3567
Commitment
06055d30ef26210b7519c9d16731cad8447e149ed6944095629d0263fabd7814
Range Proof
672 bytes (Bulletproof)
Memo
6cb330377448249856cda1f2c21905b3d9ad3df4f45bae11b71a9a971a417ee8f3554cc54088b9dd133c6845aded740663db61ed269f68c14def86df659e8fe13427384ea783408673f3f5a27e2aea4a4d9b62ccf2dc777ee2eb398a567de5495fdf2015bc2f938f91d9f512c24a51de37806643aca2a43e251ed46a46647909 (encrypted)
Stealth Address
5e4927589b19a28cd7c26bbdef2e69b3b6170542c80d138152a41a62da72ea50
Commitment
be843bcdf9597d00a78a97cb0d1fc888afc8d056f4ee386908f84638b5370438
Range Proof
672 bytes (Bulletproof)
Memo
7d6960c28a597f82803907313b3d8e058e883ed4d2a05b22e99415fca9e6a72d3c38ba2b6a6d19b0710631302d7f7627b5f117d10e4144ae65c0afd141804d285a468fc23295aeabef4e0bebf3d08babc292ec01f5683c4b3b39481b87fdf4239d00f5fcf1caef2d47a58cbadd710dbdde4238d233864f47c28e99c8b5dbbc2c (encrypted)