# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
febb1629a05cea0dd038986f99d0fb54c472d28a6de49a70ef984a4b128bbd5f
Pseudo Output
d23391cd94bfc36fc9644de596ad058392a5bea58ee0b9d1a4e68be0105ddf0b
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
02eab08a1929dec218d5ee6e2a615aa32b71c6e8d9a4a1a47b916cf7d19e9e62
Commitment
d0baa0f185d7fbd8559bfe52efad8468fd83c6342533a9980da90909050f4f6b
Range Proof
672 bytes (Bulletproof)
Memo
fcfd145d0321bd7360d4980fcae79fd02bca9743e97530974182bd0d96e1afc5ec206e50a7c1ee93dc5a8536b2257746099654b055903fc192fb5597d37a95ffc427fb2e8b0be68ebdbf6c35da02407e0ca110e780757bca34dfa7a19bb262a5cd3fadd045f4766c8c53700a8f39820a1d1dfa2737b6d9bac6912ed8a5a2ec35 (encrypted)
Stealth Address
c64a9bbe7008e0b75d96766454f3f199a541adb92cfd8fb4cd9bfd98673c2f16
Commitment
4ee3e731099e2f21899e90bd081cd690788c6a8017be1652f02c94bea0568b09
Range Proof
672 bytes (Bulletproof)
Memo
4239c408c02e59445be53b50829177e213f0586acb0b53e1dbe53fda741deb4ce1b09ee1f961e4008abea22c7ea56413ef0cf0747a95029ebe7f8548b50b79c250984b7986b42e967f545f1af90361ad9f449b4cf31cded79559c5b87dd02de0f3af61f604d32ce30129370263fd8877e33fea62dfdd2c4337980e09e5d0597d (encrypted)
Stealth Address
8c5bb2822e50904b609939d543c177e19878d983bddb05d99b3e255e87041776
Commitment
f2b1cbd660a9c9b9c24cbe6fe1b952b344c292f06fa050274b24201bd201ef68
Range Proof
672 bytes (Bulletproof)
Memo
c3228b596e4588d881756c1d729b652d47274a16c87b334979f321b09067bed3a5042bc571b76035b61fd9169a7d0f655a5689359102d12c2aeeefee378dbd3467c4310027f38e575d7e39aa7fff1db51c683d26466f28e7e6216d735ca68a76a27ad548becf2048a896f4bc5803d6ed5e27b1def008afcedfca8af5c5b709b5 (encrypted)