# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
260597986cd72c8118f37a15db913d35a7925e595a7197a1c9775f0584c3ca3c
Pseudo Output
5288ec07ee1c2f42a70d20455784d94e09db8fdce1d3707eb9f03d4b5af86234
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
223cdfbc03141a9fe96da260f4b9d0b77edd618ad7800bcbb82b1fbe5e7a186b
Commitment
4e8c336572e728c8af9026eb0f0f9d44583fcc275e2d69e69c08b74b3fd2e44f
Range Proof
672 bytes (Bulletproof)
Memo
69e1e46dc75dd2d7894bfe98696dc58795a53591e2658a38b6207f84913558a9c8239fd3cfcee52f80580b90c202eb4bfe1f54c8ea5893b07ec3498f7636c8d38d018479036117bf9e2ea4044a24996276494b5a0c51c66575851ffeaa479153e116b9102b00da0fccf9837ca3dd3b95baa023a7e494f76c421c5a4a40c5c69a (encrypted)
Stealth Address
da20fe74cf5535cd702d3461534d2dbd3ed53b4fc0341b9986ad049256e50346
Commitment
98c65db56786fd6252954bdaeb4a9f6901d2006fed86f25fc95c3f8e35e9c410
Range Proof
672 bytes (Bulletproof)
Memo
f24cff1f657a3441578bd47e36eba1d86c09ffb26314e8e31aa875c255977ecae3f47796ddf57840ca5aa20d8519b515fb788dc64d21903c12233df08c08c391c923bae8d0398200258b54f5e607046d76d6a70423388295b746f6417fb9b944c448053ef6541925b6341102c69ed80c5b10a2f649892a84bfdb3f81368d1eb2 (encrypted)
Stealth Address
286929711937572f069caa28e96d31633a07502bef32db2e0d7162dc714f1441
Commitment
f8e851175afa48c7c1dd88428dbdf0771e54fccb062867de09fcbc5d049dde1a
Range Proof
672 bytes (Bulletproof)
Memo
d4c98e539b13c768133595d045aae5d693e439461a87a76c6e7a044396b994977380e1b953a927fe530d02666fc6915b2fc55a41665a75b0ebff6cea25d4907635824c65fbb2b6ff43029aa1aae21e393ab139c2c0160d48eb21520b1775fca57f564f9f600c376b1e2b1f731975904c302eef8ba1b9a73c47744845c1380c00 (encrypted)