# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
5288bc5c20839aa1010b50663135a9ede2935efee59e33bb4858f7fb01016d57
Pseudo Output
eaa233777330468db1c1c2e679d2e8d8763a6a707968df7b45664e0409e68368
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
3296edb33cbaa7f7869a37c19ae20fc466d5c465ddbda5256600328f89fbb322
Commitment
5cf60e1393cbda6f9a95d6c1c88390c54740415c4813b2f47d957593da4f6c1f
Range Proof
672 bytes (Bulletproof)
Memo
082e3e0ed4dd5113e59c4b44df287b068ebe28ab061976014ce4d5e890820544cc343a16604d0f16ea1379f15a6b1dc601e9d20443fbff7f47826d067dcbec6348f2f09bef24f4f7009907ab8713773d1beb6561d5ff842464eeae0563bc07d395c309dd61f1e242f620aa3f8d9739834b0708ab620af1bbe68f2a1843c53afe (encrypted)
Stealth Address
282f7c69aa66443df07f804f1283cb93f77ccbf227c6fcb5380f36c22dfe8513
Commitment
66bed595bc22b58e3ac6dd2fcb42754755f99f439f6678d66de74a56b0582d17
Range Proof
672 bytes (Bulletproof)
Memo
ccbde871721be0e60d7a77bf513d8765580cca8bf7e8792342cea57e322d67ac5f8464c32f0d8df7f586490f363fabcf70286d6be4aedf4da0cce12be8d9784e4f57a3db08853da293ccc014bbde3f5d32fcda493ca9b25b857b632de886ea8db2a5456973dcbce61f0c1a2f8a3a1e20d27449d3d290518454a14471a608f0fb (encrypted)
Stealth Address
72f91d64beeef871b544ea28e00654ac95d2a3bb56a08b56faa2c63906a2503f
Commitment
8ac6eac84bd724c387c68564aae054005f776ccc2682db8811864d79ce93f160
Range Proof
672 bytes (Bulletproof)
Memo
c52a97cb7f989135c6331b999fc686abb7fb91f964a0769458a10412b2a7a6d71acc3f25903e8786ff35101c8c232e312bbfafe49eb2e33eb10cd67be38c7b4313b040c743adb17e2820c0ac93f014ac32ec343a6e8a7d778149c4403e3ae5f53d3f8778d0ccd9ced41e8bc727850550e2b7f9a262163f021ce8d3e66d9e45b9 (encrypted)