# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
4c21514feadb268c7c92936198cc27c21070aaeb550c9df1c2d2aa17549def66
Pseudo Output
8a973aa4b375227b05a8459688489ff1822a14376f193b153ebd094eccf3fc3a
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
627f28621ac7ca25244b6cecbbdafe1291ee153eb3da6b3575d21e3514389f46
Commitment
a6814fbaa46d2233df51939db275e55fe7e60910c41984a18c064ce5d8769205
Range Proof
672 bytes (Bulletproof)
Memo
cea38c46f085e162e6a797747cf33a4a9bd02bf81616b2e7ee14a932ce294b2691899ffde82f9a4f85912261697f5abc851be004a401dfec1aeb8a7e16fcb1ed57917b2092b0b8dd20f9b4106659b168b7cd1f3391c1675782c5a3562667718b86d533586be539aa0d0a4e15661dc730961b56d47203f07251199f08bb18650a (encrypted)
Stealth Address
84310a003d6a4aa54a3e85ed8f777137b0b078e85c92bf7778e5464a6ead0d23
Commitment
44bdb97e41806326e83fc35f35456333ddd35347ad1b3bba289d81ec3560fb6d
Range Proof
672 bytes (Bulletproof)
Memo
8b81bf107ea7915f9fcbe3da285cbae6989e53b3863410341e99db9e38a089f1322de107bb31117dc6456065d74836433e757dc058284ee955092536195837be78da28de85ea328986c736b50ba7e9395f3345af5e743cdcdcf7bc18478b038f0aa6be8cc07fe2f8325acccd6ff68495fa220c4154dcc85a0c8f615c703bb1c2 (encrypted)
Stealth Address
dc368f52847993295bb8944735a7c61ae48eb04945c44bbeb78e4125e89f6035
Commitment
9896359b8ab3f55ca670f2cb122ccdadacfa15cbc26c432fe61190a149003a68
Range Proof
672 bytes (Bulletproof)
Memo
d0a5ea8ff2b25c1a829af2b33c09d6465abd028982a6c4ffbb877fc76677bd4ea26d01dab7b52f3cb71d570cd7f410beebb6ab16670ecef0b6bad50f578b014a4f74be4755288c8d9d517a113ea1195faef3bfc742ea4b9a06a59945c5b16751ca49ac3e1bc6f965671c1021b6e333a17a4e2cec18f625ca9e921f652d340e57 (encrypted)