# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
5c2579b8964a641597067526f1d1a05357588231924ac4dc88fae63da9739624
Pseudo Output
ca460aa506f5a7cdd84f8be90b5302702a00876d402783e354c2700abeac4659
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
6cdeab11f8812bf6e2037bbe839e0659a1a164b545d02597c5404b02f257093a
Commitment
5a2d4b866dada60ed0d43a8a9e7dbfa5da21efdcff562a6de77df439c96c5c40
Range Proof
672 bytes (Bulletproof)
Memo
59b9e4537b1e3fd33318c188c2bd32c7accb231ac2ec40123cc6220cb6ed18b1ee3e1e4ecc3335997198a20b8f364c9f3d15b1557d09e0860fd9a13b5d5f04bbafe0af5a01e8edebbdf8dc1e354162946587fa7967b0b801c9793194d21dd7453c990fdfe250cfe6ebbb1cbdeb6807ce50a95e2cd5a8e5ef8d3f4609faa28fcd (encrypted)
Stealth Address
b8246a27867f9f8cb5a5f16e0af7fa298f0279530848bdeaa174312bc13de721
Commitment
e2c4b8f82a66c3ba366d4d3609ff921eaa500228c8e354e237b2b9dd778b7c39
Range Proof
672 bytes (Bulletproof)
Memo
fc363e971588b5a2ff001498515312175339c8eb2a502500b3b1b5c8c78addf1b1f23e993d8be2cff38a06e88ece03ac87f47489de48293b0bc78b1c02a3ba8857dd78e1bb15cb2f76e0c5ea441dd2bae1d39f9cf67f71e5efaf47095cf0f0f9ab921c32d17113b9d5606a1a851f23e65d739e460a8e6fc13af34122e95a29c2 (encrypted)
Stealth Address
82fb26d8c2c068b42cb427d47b4f93bca2ddee57b58daa9c54312bdfcc652961
Commitment
5617d09348e207081cbb71779a92c71fdaac6dbff6edb52f642cbb5c2498cc2f
Range Proof
672 bytes (Bulletproof)
Memo
8166c57d756ae56a82b447c1aab3c81ab0ace6eb3e96981c8e187c55cad8f27a808c85a1567a53f9368d84b45aaaa3a3a592e564a252ec19fc9c91ded3e02b0b0706c6a1953a27bc7dde2d829478b0f80091cc61731e3c8be1b5b54942087a0986e9959ac2072218cea9d978f190f6ca246d811feb4a5412b349960fed827fd2 (encrypted)