# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
caf5b8ee5c2006424fa24edafb4200a5d5aa7d6f7bcb40a660f68a0eb962547b
Pseudo Output
f49ec52095c42db7d04918d2a157eb054ef11a8cf7499bc3e7d7b8e894337356
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
a4366344f2c24651e3250ce44eeaa3cf21e32cbb8c0f256aad3d165ad979f121
Commitment
be43822807031bc96ba8a94bdd795867047f774deb54d338468f833135e9507f
Range Proof
672 bytes (Bulletproof)
Memo
686e3d13b88c99fc6226f76f8dfc71043b8c7e67facf1d1afa1f62b612aadf65f034882b27272bfba20ca101619ddc612cbd85b12de4079ea1d181f3ec7a3be59498414eb5bd0bb22b11cd94fdf5629e1dbf6f4f5f6bbf4f35f50e40ffd1ba42dfb747e2dfdc4c7148b54c7bd99238f52a1868d0ed0204d939f54495f23bd198 (encrypted)
Stealth Address
240fd84c504138c863077028a95a124fb46ac8e540634485f659d7c8022f3c4f
Commitment
fc6fa84b6319eed69c25c7cc2e315695c9ec8abab0d76b08a9d6a5bf81ed5c23
Range Proof
672 bytes (Bulletproof)
Memo
35ac0668a457b8ea7de7c3cc27765b71adfb003bf332f8350e27a897ddb63246a28b95199229970c8447197455ce3fc3240fe2aef6b1659deebd2e915d27f57b989ec1be4ad6db9c95327e08f1e8cc2dc139abafd2a0d00e392baed180c847b8a8bb89b58eeb45bee7b71b01b21609d6ead916311ca8be2aaf484956da19fe5e (encrypted)
Stealth Address
da816bc360b027ce547216465369f0438ae99768791c602e4b9ded26dae6826c
Commitment
02f284ea3bcb3b5adae9ef6af2b85d166a225d884ee8e8a73912162995b5cf33
Range Proof
672 bytes (Bulletproof)
Memo
ff82bee46d27437d7eeedb323c10c7a3dc7d148d80bdee9950b1a131fa01ba52f1ae1336fa9d3c0082b7869ccd0049a4e8a58a9f427381c1e60abf6bd83f1d5cd43d05b143591704ea642d37088949916910776e3a31af8a166b1314693626d08668864d6b165aa92c08147cc371e86c38c70ced90232e000bf2c829d2d35ad7 (encrypted)