# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
f62ad90db114456e615091d6ff2f7c56a45009b98d1a0934fca301c263906134
Pseudo Output
bc078c3d777c779aa7ecbfad5d1926c765b9a30f5350aaf50d7bbb6444fb105f
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
301772e83e5e684f6aff8a32e2971175a1bb6d67da1702aba2ff2bee1fdcc64d
Commitment
fc7b5a05b63ab6ca9c7b9b34544412016ef84287fa69276c411ee99190165c3b
Range Proof
672 bytes (Bulletproof)
Memo
09d8da05aeba7d6dd58c5a5aad0a0e67868fd86f94c999e55e909179aec94df7d599032275e896147e8e14c4dbcac326688dc62347b6f9af07ad8f6614eba6bb82884277e9368a1d2605f41489fa004856767e6f9c574a081a96c6c2bb11452720bdcc088deb40075f7463ae1a8fc5d2aecc5f62d9e0950232af2e044847c7e5 (encrypted)
Stealth Address
163a62f554c023662f4975cde40327b282767bdc213d2514c50c29816b83f309
Commitment
1696e32d11e4200a10a1bf68e9fd99be5eaefe23dd34feabe8f8792736957149
Range Proof
672 bytes (Bulletproof)
Memo
99cf3608a83e563e379c4273c75b502b9da0124b34caffa1ad59ee095b254cd3c46faa452b6b4f44186e8d02d8bfb5e55adc9be6e4d904a006fe892b193ce5f026d91c5e7fc4f7555d071dbc00c6e54516352a6b191ab307138a2b2930ef409d37d88e8563bb9d61314e050e4ef925e948b429525a591226a913e0b7e0315f1d (encrypted)
Stealth Address
b60e8bb838ff1e8de5f818d04a25452689d3c16ef30c2acc56d3c1d490e4ce0c
Commitment
be9bc88869d935092cc18bd3f65c6c54be660c761d5f171bf3aec555538e1f66
Range Proof
672 bytes (Bulletproof)
Memo
5c649694f383e9c3a4e2ea61ea65c0e46c74f8dcd81a320b6ff30dddf703d3c3d02a1189a1df753c04cfd0f6b45129a97989773d2737c34c423f309ac2fa51eab3c4ad87207cb0dc3ee172be71b9ebd4b14a95524e6bac3068b4c9aab95545a0b16d2ceb42eb38d71500b6ea637468c372f8de54f1cb3ba6b459ba9a85baf9d0 (encrypted)