# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
2431e873e69e1467f058caf8eb19fd79219467d233ce52100e0c20a4cc45e04a
Pseudo Output
e29894b08d280bdb30e386bd998b21e459a4dc6f2ce77efda82a36ed1b563744
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
564e6a074046799bbca4652a8f3de8047d308bf9c9333e32332752cb1575ec65
Commitment
4c9ea570095bbcf7691ca6222aa4520a9292764809c4f83f027c17a7c2413b1d
Range Proof
672 bytes (Bulletproof)
Memo
fe5f28d98787776316aa180e8d6640f13adab7f9d97dfebb73f605344ee11a9fc74bdc9d9ffad603f49bca5c13737451e8c83cfe8f9f468cfce4d00252b74a1854e2d2064ab2b3a3b40e6054c1ecb491eb6c46b14e8cfacccea58c6b85ab86af3f53e911bb522c4b05acaea78dc02952e603c68e86b0f39ffd8052f40bf0e677 (encrypted)
Stealth Address
fcc728d2b9192a8a978875f20eb96d98b628432919f1d72f8a4f22fe836d4f35
Commitment
a2ba8c77323db8abef434e02345fc8c856543b23dcce4d63ad7e51957855554c
Range Proof
672 bytes (Bulletproof)
Memo
835052fe59187e130ab8d07545b79be487d0e5117af79181049de848ba6652c652d754acd57893ea34fd5cdb55aea1aa949f13cedb8f49161558c55a8e88fb8c8799eca47848f0637d021192fb648f483723f099f2c27613384d74b1e67ea70656b296eab74b7e0deb162a654f3fa872610d4c4f55768ec595f53cb06ba5ea44 (encrypted)
Stealth Address
d8dcb9e3ab7f4618f619915ec1969bc094e6182966a20c2e4417071f35c53d59
Commitment
40c11ffc9874cd06b03a4dc2bd21bdf539a53460f9bc56c2f2b1c8eb7081e85e
Range Proof
672 bytes (Bulletproof)
Memo
fd66fee1a7c1462b0ca847e62c4713764bf0b0e6d1ef9e7253b3746e6e2561e87bf432da7bf9fd645f7672f7656672e030aba65750ebe5c2f91867a71767c6bbadb10a3adcc20032cf130f48bfeb3f3db21ca795680d5e0ea7ef24ada12e10d7dacfc3292f15d1d5420be1e8bb73be1b1192ec1b2fe4523afd6c5ac0ff107ee5 (encrypted)