# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
866513605737b4dbf65019b3537522e47039ab7e50219695b5cea15f329b3514
Pseudo Output
fcea27359816a2bd992c4eefb3fbd5a2eb764bc2897632842058a552f677f07a
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
3a811d247bb0c4da0735a950a8518ad2211feb72bf0018691e16eb4050ef5070
Commitment
6e56734a9375a467f76433a2f99468eb1a713c486743872063a53daec1996d07
Range Proof
672 bytes (Bulletproof)
Memo
2dca6f357d200cc70b3934e166541917304aa19da571679666bcfc96f48c37c4777c1ba62c18d3cab7a003ac45cf0938525a214157ffe1d7bce58ad2098cef26f83032a4d81920eca0205a9c95be7a36db3e294c2a42b6e3cff6fd9ade8d3422b2351e5308af0ea9186a38ed6d2160130a4709093d27c6482b91bdbb192db1a3 (encrypted)
Stealth Address
4c97ff9a0cee8491006b6a99d1c3f300e3624dd414c1aa54deeea8fa6cc7436d
Commitment
34052f458bb260e7c1b6830f99c555441fea8d09521575764d5135e0c8e9602d
Range Proof
672 bytes (Bulletproof)
Memo
17a3b65189ff1519252de0508eed9eb37a1fa08d8fa4e2e6aeaa41763e1c7eb6b2fefadbbb17812bd28053d1488abfab63806ef8554e9397c31ad25c06bffeb7bc871f45b7f7ae99dc8570d47f84440db773295f825b5ad433be4bab63b98765e62f61653dffb0f6f5614bd2ae8c2fc381000f5fc81d7084c85c2f9938dbdcfb (encrypted)
Stealth Address
b23c3e016cc6f6e59dfc919cdfeaa7991823299d51729051e8faef2bd4be7205
Commitment
6454bf665c76fc7f179af225f3d8b250a2de5a13be9a4bb42e9ea79ef34ea422
Range Proof
672 bytes (Bulletproof)
Memo
2365fe0b9a2258e6c266046b0fa401e20aacf44b02f8add4b6479309f783acc0435773dfe690ee444377d7de2efefa0e22d7fc64d4324686df77c8878354fbe252b1c3558ad0766fe242d0cbb15fb4f8746493a478ae7cfa58ec8895221a87a02f62027da8ec24a37bcd2cc622965dcf89788127569900d34f5912d8086f0568 (encrypted)