# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
c2fda0ac2b738f85d321d000edaa16a2f9537722e47e9c34f68568f45a2aba1e
Pseudo Output
28156c540f1873b42afc6a117da8e80548cc2198677d5c2071311cf17661a876
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
5203c118ace009733aed4a329c39138c28307b1709f2c2e2acac74d23aabed67
Commitment
f0fbb752a275e8ac30acb16819d6f51f24de4cd63436347ff1688e4f05133554
Range Proof
672 bytes (Bulletproof)
Memo
566f097041e5b284c5e2d479ddfc13e8ca47fe7eeb48bded8b59f03a36096dd3379a354e6b8766150165da7ed6d0d6ec1265624e9eb3472e85d45e962ca8b871f636e1d7914fdea88e680e58ab6b8bf1cd60b815dacb2b692d8b431cfd357fced41c729debe422695fc5a6ed05709a674b0e5402c91b3f649c9f3201c9daebd0 (encrypted)
Stealth Address
a23a849075542c769f223b83c9a04ea03a5ada4a8995e176de35fb6c61e3aa57
Commitment
d29e833b6c3eff93791b7ec7df596c32624e16f865b94f0b6f165bcdaa575507
Range Proof
672 bytes (Bulletproof)
Memo
30995a31ca89dc6ae26e3714b0193dab6695bfe7c774a540a8c5352d985ca2cca387308a6486a36d7e101b1e8d61c3174127e60e9d5327f2b610db6113db4194a1b20d5732e86ae20a5ff26c814cf2a3bf09307c8a4dc1bb56bed536f3cc1552dcccae8dde47ed91348bf760e372230f8a12030012d5ba1da018bf3e7bc23342 (encrypted)
Stealth Address
aec0ec8a1a696eaf27ebe03f9f290b67434c3d7e5eaca9a82d716bb7b7774031
Commitment
1235915c8de17524387a9a4be8791ea7a8330c36c0e08105c85db1c0ed930e25
Range Proof
672 bytes (Bulletproof)
Memo
efb764633af4982d5d4ac9e6a70819cb236a29acef9206a7ca3dc8e8e0654dc61a82158510f010b06ad2253e25de83025ad04e43f9469113cc3bcea371827ce4a55e807b089cc22ca0da37bc07b0234846661c2b7c97775e7641875e61e3a64457a659a70b119d801ed6173af81ef77018bbabda4a8731f16ea4e7593495dea3 (encrypted)