# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
288890bc02d1a6a05da614eb5bde405e0a2a84283c9b87489883dd198c201f6a
Pseudo Output
64f88a6fc0ab1101f18a6040038419d2e3f8526127b4be07b082521a7b2aca24
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
1ce99a1d4c46b0ce48c0a0401fa1c75f24019d949b033fb808effceee4bac865
Commitment
c824e3c4cb6961a2af4e3ff6ca4b874fa471f568c5bc0c93a3448771d0df002e
Range Proof
672 bytes (Bulletproof)
Memo
75faae0af8dbfbb8d16f4b053a0471dae0d51c6389fd269dbb9f44ea7c5ddddd500e6ce3d8ea08db7b157f948646544517c33922c77a4196a15e6ac22e7088d0d135e27cf404094bbeda64eb8ac3bab031c0e605a72538bb713da2a486b631529e735c237dad51255caf04e0b6d7ee0946824153fe997749c5a93e9151683434 (encrypted)
Stealth Address
300f8af4fb3ced746ce1b2a7cfd4356e19674622a11d145bd417976028ac627b
Commitment
80b6ee855ea4424f86b1bf5c6c450c59f7d70bf9b16cf54dbf36132b62425543
Range Proof
672 bytes (Bulletproof)
Memo
9e9398a2dbc8f0fae15d540f556dbf6d5b115cb5d18df5d16d8c8a6c4c4c2da30e59dca5754e312a2291f4e607c19b5cd0c233b07ce322b7cce05637d20c84577222361b7608df4e5a02e0584c662df20998d768fb5a67774024d752137122b80fbe1101ed7aaa3380a771a25aa0e95d100d203d096d3f0bc7b03a6dc451bfda (encrypted)
Stealth Address
261d7969dee50653ddced9464142c9a02e4ec35c0f2e43f7b8b5f602caafa56b
Commitment
f255f7035857ce1f736054c2dd1a84a15f7cbac951dd8d5086497d98a7c16c7c
Range Proof
672 bytes (Bulletproof)
Memo
d5be50d49dc6c465d57cb2f79c461508099608e822a6400b7628150a837a0b1784798be164041a2fcd89b15a092e82a3b3b091a35f79da64c845f8a098b684a9c63100ff4cb3a9eed35a8cd58088475a2d7104508181c1b7962def93b136d7e4d038c91b391b90e59f06a7a3094a61d1246a4639c2018b902a080cff922f8897 (encrypted)