# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
489ce32fab8fd5a30ad8aaa70b97861cacb00562746e898aa15984f0d7d7f14b
Pseudo Output
5a2aecb25ae007c1c99b63d22e7eb69af24b1dc86154387e57dee355198af978
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
d6936399036e91455a9c133b38ac8aec6e651e13aea9b9611e67137e46423c55
Commitment
98502ccf6e319feaecd66b6f2c94926d99381374224dbac0038284f3ec98493b
Range Proof
672 bytes (Bulletproof)
Memo
c532511c544ef996536f7eef3546eaff9c6de46a1ceefa8c35d2cabf22cb38673fedc4810ca1802d45922c7b2d357e0ed55fdc9bba8d0cb63cc6b4530d3dcf16eb87425d50ae756524548e7f4eca68f37ac9c6cf8cb94777c9eb24b15d53b7d5a431573116bd47e733454cee083bc6b94295fbe7dda09105f7d836ec1bf6c2b7 (encrypted)
Stealth Address
d2a86416073f87990c82748c05ea78dbd09af116d2f60c8db4ebdb83864ec16b
Commitment
0c3d0c5fb14efdc20084e7fc990b56986ed4792aef3ff44f39fbbc741684f272
Range Proof
672 bytes (Bulletproof)
Memo
cc76b142da076bd3609d6bc02e502336cb43f876ed8697e08fd81dc9a70e2243a0b1350d99d17639f07e11e6b2c6d30db2ba0dc6cf33ca2379a22672adb92e770f137247f3fba161ef9da3cfa1040cc522e78aaea49d192c01367c82dde0050ec2a2656fb29eed971ffbab462c0047347a6dfb4a58849327c7c1388428a34cda (encrypted)
Stealth Address
8034a0c53d304a1471e344e57794b50974c78077aa70693f0b4fc7aa9a4b4730
Commitment
c60f4ee0845b281a76c3878273ac15f10dc54732ff0d9161e482e86d383f0a36
Range Proof
672 bytes (Bulletproof)
Memo
e853ab0af40b734d31c534498585d7ab577096d521cdea876d4827917df9b82af8d369dd743deb42f3d39f32adabc953d7f54fd38c9b5743742f562aa95384b46f60d6816b85ba96bc2f992b265769b15448e77a362e4711e8551fe539182a2091fd1a180dd6bcc9f15cd120f224dbe1afc9bd2c454be551292f5dd4c6d2000a (encrypted)