# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
2600a025edd734fe9cc1bd51de6b726ab069c8959c56ffe33658a4cff839d26e
Pseudo Output
0caac1c3139d20aaab1eb6561c7581424cc0b5d4681641a5f10f12241a3a7600
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
d2630a9d4348a7776f3fe5073aea049c958d81b4f77c04674cfde4f5764f745b
Commitment
d8323dbc9fe2499af5ce6cb48c03e06667cf107e506bd3b1c6395c3160387e7c
Range Proof
672 bytes (Bulletproof)
Memo
6393f559f9da29667df971ac3948c35510de412a791eb7580d5e9768ce260d19985f200ae90af571025baa12673dd3a5d1b29b08e9e994e98e13c550a32266cd75bb73af4fff6b5b6881255ec688b6f5927ab13ededbd52ec9be326a09e47e37586f38047f21eab44bafce698bb181de10de2d0c5dfe5a2d9c321fa177566cff (encrypted)
Stealth Address
d019b6cb49f800271fc79980f06a0949544c32ad7e9d9101728081af1033c547
Commitment
5eb648889dab7f41b44c126befcf1ac3e22b9746a81cf6943760445e996fd408
Range Proof
672 bytes (Bulletproof)
Memo
b44a44de97b03cc410428c6baf69d3e673ee0140a2b1a175eaf3c98428b85c5210faabde8fb85e01fc4a8230e3712ada5d2cb9978e88c936fecc95aee650954d0ee86caecd22e6f7770dce414245770ae6c7034b3821e8445a6855d5863dd81acdf40c66fe3ac5e9d6d97acfb096586b332e731c3f1c4ef452e144a5c847b410 (encrypted)
Stealth Address
feb2d78c9cd587b111484a09a00a6939b36a26ff223c87b6faa319898174563d
Commitment
bace6cb508d1705c288b629d0b73c24a8f3630dec0dcccef6c04e146cb55ca2a
Range Proof
672 bytes (Bulletproof)
Memo
a2838c5d9650c99b1a36320431e1b3b01327a6c7f3bed7dd3fbce5a0da3127fe2888801a216deddd83abee624b56640456e094bab4122d300b6ca5f968f12318c41c3809830c6ed1be615d9582f271540be50f8282a121e26850fd513d0f7326faab979cc3a67961f0e4ef0e097565fa6f29420ac5e3dd79456278eb6a259acd (encrypted)