# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
3680fccd8c869678d9e46cbbf20e1c904fc6cb8c693652469a16cf81a66ef805
Pseudo Output
943d100269afb495fa47fb758cac4102854518d95d74c35994be2d5c9c2a9173
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
126927eb407e2c16813b460dbc94fa5e45018d43d5b7e40b19f5f13d741f980f
Commitment
1c2add13ee6ba9b99d2d4f28eb2fb25ab32e0b97e69ba24dbf636651bf91c11f
Range Proof
672 bytes (Bulletproof)
Memo
6331fb5a074c8a5c755cefdc22a371b8034f87fb8898124825a8314af23085b9050d08c7f068e5ad3917829f0d975902dcd56d9ef2f5c937d2c1985a6e0128c0d8c4b5aca00fa6502396d9a32072c47e50b5aa75e46a698c9791deb45cead3550d89124a026fedc7e8c82f12db294091b5f28121db703d0b21bdaefecce0ad85 (encrypted)
Stealth Address
58c97a83efe7f84b5b96eebebfbd17a820cb296bc17e8c76c30bbdd723ab1211
Commitment
5413e6f5597ebe11e8101092f73547d88af359dbe4f32e3c781fc5bfd49c5c3c
Range Proof
672 bytes (Bulletproof)
Memo
0b19cbf8d0a20d625233cb0d43c14e1793ae9c757b87be075a5a556f5cbe036a796f72682509eb916b8f1d09cfb1ce87425c54069ffec6f324bef4925443bd3cfae54d82d0580aa26d43c0598a54bd3bd3fc2a50de1ffb12f8daefedb1d10b5cc5b4e76d783f0a83555a9d5dc495068446c76ebb9d66a52ae3b5fe60f232fc5e (encrypted)
Stealth Address
360695a228dc68a21a5300dd268a3ecbd33a6bc0d9323a3e59748e61fe479c72
Commitment
a422b2120ae09dffabdf9c2dc5ad4a8778f5e79ca40e56bdea9fa5a8578dae38
Range Proof
672 bytes (Bulletproof)
Memo
501580931a22902ee759ab9ee1b7bfa6a1908c2d2ac960df803eeb2936ddb2dd78dfc28411f560bfea396b0f87cd3856ee4646a5165469705aeb324b06fb045624a873a6e7763ff6a99491cfdeecfbb421a9ff90a0bab41d3a1d76839cfc7c66d89155a96637c49bacba1881ae938dd2730b680d3799a7ed0705f705270c7c28 (encrypted)