# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
42bb6aecb80d9d3e42eceef87d27811c0eec541be3b3acd39cbecf020c8a9a53
Pseudo Output
24016e993565861e6d75bc4cf100de42147131359f566803d9ee9408a2b7a45d
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
7644561bab24c811bb35c5fa36e56b3967897e2ff1c07de72a018852d0b0df5c
Commitment
7a92fd83de10e38d3c9f6d871932863ce045858399582e344faf67351b844931
Range Proof
672 bytes (Bulletproof)
Memo
fdd69b03d2da84acd5a4b1fa610fc20ba286e7d5a041e140a6a4fc57d2d40cf2e2b27e57645ccd76ff34ca1438da88695eb29e90d21e63b73946bb8b0a791db68751520dc1110c6e13b274473cc00d833ca689ecfad41e75e2da95c2140e3f284bd0f8813f4bce9bb1fc1fb8aaab7b282dadc20f6f27baccbbbc83ccfb3c040b (encrypted)
Stealth Address
d2e53ee40cc599438cc2b0e7f510105d7937bba5fc34d2141e52ce2f8b530f2a
Commitment
442d4f2cc92bceec39308b8aedc87f505e5db744bab59469fafb2a89d58e490d
Range Proof
672 bytes (Bulletproof)
Memo
1b0e42bdcf08b8676153e0c035eca61fcb1cd6d31460aeb1a0306bbf32125550c70bab687a9a59b6e76903d44c9177054145fd13263e38ed5c2fa9861d69acb8e99b0fee2272bc6baad8fd32b5c0d737598cf06955b6499554768abcf5b6b3f1cfb2f53f4b62607b9a6fdc4dd01e1edadbbc3161adee21a54248de2bcbd80e33 (encrypted)
Stealth Address
0200b92977b1a53593e8fc597ae149b511fe8394464d671fe07c23b1ea6dfa6b
Commitment
948cff373ee0b4421ad1ea08ccfd7f267201115b6ac11c6919d4dc0224bbdd7f
Range Proof
672 bytes (Bulletproof)
Memo
4c79da4d516f7826048b28fa829b620e2b27ed280b00df3d4a8d366228fb05cf271ac145a4e216b10c4bfa43909f801eb3cb4eac43c3bbbbfe2cee35195437c30865f457583217568631cbeaec62659b31eceb2675c4a70be0f9860664ea31c39ec646dffc93a81cc195640cf1055a78243a50c48fd477cbda23dfcf09e6db91 (encrypted)