# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
847afdedbcddd7d039141fdd1484dbc33edc96396c58fcb9f20c004184fcb11c
Pseudo Output
e664de08053e739869e0d8eb9d82eb9f68f91a7dabe9d08ae47291162b409055
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
e240574f15d8931e94eb068fc4cefe9b759cf3ccb46a354b974e390b5274815d
Commitment
7e24e8d5c8eccb3f289422970500f325774cdcae0aa4fe8c35405e0066024715
Range Proof
672 bytes (Bulletproof)
Memo
2af791d949a0383ae9e348b85b891f530793b1a8041e6e0794280376c76ec885033511eee83f835fba208df8619b567c1ba54c0a33ff099e78648e2be9e9adb6ef4d8a3f4ed370bec0276f2bc6bdbaa2e6ffd8a23c63f007bd22a4683e474dae8a21cace85923712f5e1fb343fddc185bbca291bb124a1098151e04c21f9ad1a (encrypted)
Stealth Address
00a56b1defe52c7807d8bdabdebc40f122df488cd5c7708115d3675a58356f1d
Commitment
e44c7b032b6394685787347fa33776f50760f2a997efaabcc284420b6e2c7346
Range Proof
672 bytes (Bulletproof)
Memo
dea5ebadc30dae2008dfbef8cb4f171f9945fc2bc2262be9a47e8bb64a634e843e36e7905f9babdf776ba105128960651c15c08b73937fe5d726abbe79d99b83cd71d7d7beac7474be9e6233536015b9985d316c6de413d5e9a004ca1c728c1a0426378dfb3d78058ef67f41242dd2a3395afefcd791fbbbfdde58e7059c8435 (encrypted)
Stealth Address
0219a7e1517dba261cc5a8fe749defddeb81ae9f3542df2643a362fb60d9332d
Commitment
56e791369b8cf1cd1c0e25d229369eb5e69444d774dbed08011eea941bcf206c
Range Proof
672 bytes (Bulletproof)
Memo
9cd78220fbfc858b90aed341fae8170671a0de6fda281400095779761a23af45be44995447705a29f716de8ebea0375969e4e9d93bf6f6a997ed5dc922e157571d04c8e730f152ae2a9a81701bb864627ec64d02035271f9b6c89e00712eef246b7f12c82d2ccdd98b5c8bf8235cf469f154886ddd745ad60dcb0ed6f904944f (encrypted)