# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
d0db0991e214552869433df0756eed190a842d4d3af8bf443073798916402156
Pseudo Output
28adb11fae60466fef5deedbe65b2ef8154425cdf6696dfe2ee962c7962f6729
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
c83a811d6768502230271d43673c466ad2774e13e1fba925490923b3c297de20
Commitment
7ef28c2ed6e1ba93eacee495992fdd59514a920d9500465ebcda4e28be509e32
Range Proof
672 bytes (Bulletproof)
Memo
7137707a3b905cd9b5d79df4151e754a0d9feeda2c3152c289a13d1afc1e7d3219106edf6c92a6ae22a4a3d182dfa2ae3302cc93ab63f1eb99fa20016127c249338dcc0da2b9142f6a42a7a3b40ede1d42c340abace939a48d83b30b7d9f0b14c172cf78f64498bacc5e0641e515309eba1ed6d73093556750ebafa4092a31c6 (encrypted)
Stealth Address
8424a9fd6260ac2675edcc2249c8bf703b3aef57839282a58095c092c51a3c0e
Commitment
02f8cc5a82d1d4ce75f3dadbdf2d2d8021659d443369b2e791ea746d6b91c073
Range Proof
672 bytes (Bulletproof)
Memo
845c2b29958e424135ed35ef5969ce7b507841b46313d739c950c2814015d2ee1c5494d016c395f746bbdc4e5c16de5e96017608e6bca410d5ac0a35b8f3477f1aefd74be789a35b0c986f91fe47ba90dd6420459fb6b8e23f3934abf6f2460a7481208e49a827cf4f1e74fe15f3cf8eb5fc3c092472917ce3a3b8fe884f1eb3 (encrypted)
Stealth Address
40dc144abfd4c9af668b5feb19642134e3f12cec2364853583b4879627d2d609
Commitment
264478caa504bbf695aa0f9a2c7e0c3999b2a59407d316e88a309922bd25d654
Range Proof
672 bytes (Bulletproof)
Memo
305b321c2903fb3b79edb1e33cba3b67196072bfad69e951ada9374df39823619559b7312492f16724fd7b40d9ecf068cb35485d81191f390a4b913d4c039020e567ab546eb855fe877146fccd03808e30dff43baa04ca4ddcd02aad0b0e0eb7ee77eeca8bee3fc7bb07b4049d45d04961c44da26bf22a87696ca37d2adbc424 (encrypted)