# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
d07d362c5f3290387c878467894bebdf8ff051c1b7299412f73d502fbb40e115
Pseudo Output
34a9e7e4e78560982915bf9f8787fa53dbb3e756c221eb47ee912843faafef76
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
1441c4ae0a9dcfa53c6e37413354ec76f6bfa47fe19fce4d210f98fd64c6c153
Commitment
f6b3a97ce00997a01585d533443805d62d4d89ceb45b69195f327c2bcd7ed65b
Range Proof
672 bytes (Bulletproof)
Memo
30d00dd304650854f01dab47f8d0e180152b547d563bdfbf3824d525a8a9e830915441dd6d08e736e93bbc9fde6f38b9bdc0ce6e55879758d4d01d142d067f05ed06fd66a5485bbb694a4c3667a4b0ee40c8e1cd8bf966d248bb9b516f613bc3016880757e4932886827836513404f519da5a49c048a4b5d593bf5dbd962d115 (encrypted)
Stealth Address
2e4ad42b91b8d22e6e6cec98de6530e97e4743ecbe38be0a663b5bc858daf10e
Commitment
cc4aab175267374edee3753573171b99ece7adb56b63f2335ef7a9acc6484f13
Range Proof
672 bytes (Bulletproof)
Memo
a9b6d894caafbbe384a086662a1481088786250aba3aac51f33f786f50e631fe44ea23d58e86d0234154ff6b9d54a8a7382df65ea29e2ae974e557b8382b2a2ca49aeeeed3ed7c0134a348589a92d3cd8b4b2fa54967222824a475a38f5e026268b0e0b3ab54d2b1adcd108562bdf2249f345f59529f6e8bcb0b91e2b0ff71a1 (encrypted)
Stealth Address
2a425826ab04d3350afd5ace85caa5579e0a8595825106e906970335935cd801
Commitment
c29b522033c0ef1a405c66c6e02b14826170bb09dbd041f880fa750238691d3e
Range Proof
672 bytes (Bulletproof)
Memo
d59b8f941d985cf024b6623c4a23e75490698ade03d42ff8d60e66a6ef223969adaa25e4673c9aaaa4287b909d40f75f9014436002c1b6495f059e0eace68c85b742276b9602c1797845e3ea67dccb8e06c3655f64e60ce1326f4788264a6b3f33c33b4b5adb97750f6a652b486b5ad6712a6940821c8c2f97f3f5f250654612 (encrypted)