# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
f4d3788dd1368908694a9c5fef08983bed560501f2a124ad4af7f6014941a43e
Pseudo Output
824838d639aaae463b2c528689cd976b187a74172770f96b8d24046f2c84f770
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
9e1bd951d92bfc96c3a2f0ad89bcddbd57eda7e5264fdf27279b2fdf38085345
Commitment
1207e829edb556c0c73a77e28be36629f187bb1b868ef32b94f088092d437c60
Range Proof
672 bytes (Bulletproof)
Memo
493dafe43ee469c2c0ed1bcb602d0f66dc0ee1b539f33c48ee8b75a64c6a8461df18a0a61a2838af05a5b0c5d59b8d30f9a3c43cb0967992db4f19d982aaad2202d774c20761952dca5a822986c92b590a1f8f7e342ad1b4569baea0fbb966f74f4683cd42d5115f52a720449b2c72009ad61af6a77933b84c9e4d7111e1f0b4 (encrypted)
Stealth Address
9a537c1a97f9c5c22d53778adb2dd4331735175a2fdd0a37046319fa8cc69124
Commitment
4a5932815a6b8018b4763786ddd61124a19b5e29f87618b7d1cae0e2b5152e4e
Range Proof
672 bytes (Bulletproof)
Memo
643a3db8fed440b47b5364d02829814c489226098b18e4cedb4d9ed13ab415d49f9c1fa42a1a5c0eb88ed4e0c213f0581dbcd93996af95943b21340db7420718f63679823abe21d8a3574fdd77f188a930eb15483edcad6b034d5562767f6e95d9ec18dd8862d0dea10c0b357130986d330f2d4e6965f3b2b72ca8b5d4072b06 (encrypted)
Stealth Address
585f504fdc37ae53429b526a680bdbcb2860d798c3eafe631d512d1e97da7f62
Commitment
4435e4f9af8ce6f1b510fc254817c205b4652cf4de69ecd090080630ecb0bf0f
Range Proof
672 bytes (Bulletproof)
Memo
13364f1fcfa03ae99aecc8b904c0333e3fa604caf432100ffb17b50bcf597a5f4873a00e0a3014b11ad7d0e23cf7fb3f0d62b6581e97ecd304e9be7d6b66333ea17b96529cda9a99e42b0c76891cdf6f7adcd4cec05c759fafd2f2114da87c8d89f602b85dd64831ddf34563f0edd5dd96c267c83d288088a04d3073d8e6000b (encrypted)