# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
d62d616c0b97ec79e2a3bc1085089e0ac0d2e9c44a013a982222d9072f361913
Pseudo Output
9eb55d470133b794c9ef1429b7683c432c68ec60c8ee89fae7ee8526409afb12
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
d6db79d7d7deb27cdb6eedfa1db5cfd15b1cf015274522992b6099219de6f115
Commitment
a4440c3cd57a04b2e434c52bfcc70c06c23afece44e1f46652765e56b3fb4d28
Range Proof
672 bytes (Bulletproof)
Memo
0d64ee8e1e28de287546d9c43503d7df4a351d85b2a6d7ca3fe0bfba0f91db8dbd4508829fabe872d6e1c9ac96cb93cc9e6ec8db55185c363a98271221bebaf30f13445d09da09dff6cf137aee09a7c874af5c1c9fafcf5df825d9d931c7c733ed1f3b522875f0eaeaf2f47f0d0699ed431f9e425221417b7bccc49f65a5020c (encrypted)
Stealth Address
c8b0e3d75deb3f0832814c88351106424783e9f86b79cfd37815ba47552b1a37
Commitment
f89c7a0a02f4e07e3f14f7b565be5d68d1569e7f9df3f10abd62f5973a283633
Range Proof
672 bytes (Bulletproof)
Memo
6a355b0f46294e2d3bfb5152ab6e66a10c71570e6413d8f97a0ed09f0e34fd475c625316424fbe86936222ba4bcea085fe5b881a7724fb484ff259a2ce75a5e84c6549cf47c993d5133f1cb9a65be4e31aa60f9259cce2c4dcdea080aaf92047cb83817c3bed76f23cb149fb27e01eba0e48ddc086ee63c160cb02668cd8fe12 (encrypted)
Stealth Address
0a54700b77655f0d1e50e53285e600a64e1f143475516059ea12b148ed0a601a
Commitment
aec62ed4c70a8dc331e92b12909f0f7cbf36fbcfd2b48e82dc5090af6948e025
Range Proof
672 bytes (Bulletproof)
Memo
2397f2cf09d0ec21dea3e9307cd3b3107f0f8485bc5deed14417107aabc9c3edeed0f1f9bbac17906d2df84ba58712350faeac99fb6edd0ccc796692493fa42333c39609d54da37bb86c85e15727f4123dc81d2099cfdb77849b9289c17a0e6ab32ec7abb5204f35a1b35f9fe2eb3db662e0ed97ebbf8273f32e59ec893ee22d (encrypted)