# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
429119a219ed337eb8ca8b5d077628e66ead13b754032f11d39ca8c657c6346a
Pseudo Output
4a0d10dff383f4dd696c0aaac4b0a46799ad94e7c1b27a8db4f942aabed4174c
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
96b5ca412b83afc4eccf3baf5321d3b990e05f8f7aa2f90eea9b0eecb7dd7210
Commitment
2e2a29b305d5416ef9ed5f3cceac37cf8196e282a49d42a746b2329c9ebada19
Range Proof
672 bytes (Bulletproof)
Memo
e545dfdf494926b9ee3f204241cf045d36bd9b1ea80940281a3b2ddc3e9d7c80b8d2b4deea4af93959cec11820dd4dbd75530b7ac19cb30ddd1518669f94cc10806fafd8585e98e0c4cded4cfb7b3c5fabf1131f353b1982c676aef5262494c90f6ead7af706040b49d0aac42b60ad2e7493f3acfcf53011b799fd89498b74b1 (encrypted)
Stealth Address
606a26b7585ef4cacea93d12c1681e538cd8093eaf17738d4f998cae4d160762
Commitment
ae5fcce0f915b7aa0aec84f5d13ab00f588a8cbb99ac5409a8a6d7566e22e02d
Range Proof
672 bytes (Bulletproof)
Memo
9da29bc402194a4f4d194eb120d605d171351f1e75f24da179b4d5b6e1565057ea9dd78ac1179ffb1a06844d662f4cc5a812ab6e9f7ac3aedf3474290308fe379976079f62f3fb29c6b169fe7ba42a1927c068352be312fc87d4d074bc9cd6fb25536a114088e5f132149f53e38bd0cd1ecaf1417883698038c1c1dc277e7b68 (encrypted)
Stealth Address
f6e2cd610b121118730dc11864bf461612b4519fa6dbe4eca5725300f6850514
Commitment
fa5792b4686486cbc39f4c9c0ccc0e6ba8f80c03b496c90f74f5c724e9ad5930
Range Proof
672 bytes (Bulletproof)
Memo
4247821c48db44ddb300e5fdafb13577e83cf6c47c9160a1240c1ae4fb49a5eee6c952ba24f3cd59bf1922f690b247beea18316f85d4911596c526fbc08799d6cca8d2b94839796afc7aba337338ff2b755f981effa254d61c7c7f44c4f5022be2ef9e02c03eb962687f89d62088d360c30b1a61dd73298e00c26ae9fd0c693c (encrypted)