# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
9024f720e8c4a0977c775f4f23749e25b1cd3d30f8c671949e4514d561641d65
Pseudo Output
684babb6978572dd89247199e42707e71c72f80c077b79fe9dfbc82f97ad9142
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
26c48e2d037084de334f5525870c5538c296e421afbc8810278c19f13ae46f00
Commitment
36a0ee33e146b2a5ac3a6631af0affaab8b0699f421034b4d03437a2ddff022a
Range Proof
672 bytes (Bulletproof)
Memo
558782ca6647fd89a0aeaad625d12d52dbd61f6115c88844681ac16f40c885d3b5944c58c7e299eae48e23a078fe89ae49f4f617b0b5ed312d3a07fd0cdd1506a8dfb9bd621963df0284dfd720a9436b0cefdcece92ac2c57b2bd415221d42007cfa708aabb98165be39eb5a9daa948ae27fb5ec0f16e39116149ae188c00c70 (encrypted)
Stealth Address
c0e1b8c9199d1e0be8be7dd107da1010b2b4f5aea206e699a26a355b5ff7bd69
Commitment
2250ef91c9079ce57c7168a294dd2988dcf3646d66133921a03047726fefad3d
Range Proof
672 bytes (Bulletproof)
Memo
b9eadee8a75a4580ed21d4783afab6f09a72ebec334a16b5aa61e00599cac118fd067bbc5cece2f25db2ce492f618415ed73f985253fdbb51548057cdb3a5ad2ba2172d69ab51617ff6a1ff100e7e12671ef83a59a8535101cdabb639fc8393e850f4af40e6fd550a0b83f7e7b215abfe586c6dad2dd9822d572cd3ba2437012 (encrypted)
Stealth Address
d03f84f112361c12fb132a884c7b3fab136033ef1bb3360b970fe6bbe99e5843
Commitment
b28df6ff7ee1eeb5736a791352da52e580b4f06d415e3bfc596af099e3039375
Range Proof
672 bytes (Bulletproof)
Memo
2aaf34e8594992e6403978f47a57867df27386c6b8d1930a0da6b1b4a3fda2b1b9d25dd869f848d3b19559e3ac42f9e2269d8a15936d10f7691cdbb39000b7928fa392bb53e243bcdb8c156fdbb47fc12971c1acfdaa87be5cbed06c81589ba0efb0c56e6a7f52b741c11e031d8e8f37993664b190a5065569cfe96fe73345da (encrypted)