# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
1c7022990e9924694224ce3970d8bd86d0920a9593d9d80ae01154818440533a
Pseudo Output
74d6cc1c08535bee13731197232642f7fb0da39465ca67ad5c23eee15d3db37a
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
962d10ea155fe47816026b344dc503bd5c42a9efc94d4bf683f6fe3a9529f00f
Commitment
b47604e47828fa6f4d477a170604684e8eef72306566a7cb90bed039a1b9982b
Range Proof
672 bytes (Bulletproof)
Memo
a564cdd711f239f928cd7183bbe006a4cb86968156a7c21e184bcc1407147be038627aeb0c16438fbb5987c455ade316d388f9ea88a20995b17eb5e166d7581842a42f5797f0e88849a7e2b1f5c34e60a55d25048189ce1ecbd12f77c847710568814a9f19ba652b28954083f33b9f9bbc6e7c24e471f6a9674f7069389fcbb3 (encrypted)
Stealth Address
280025feca8769844c2537ebcaee58cd793172834e553b990dc956ecd9824814
Commitment
94df4ced0a60ab741843c4e082261ee784e33a724746a40472bb9b8e86cb5a46
Range Proof
672 bytes (Bulletproof)
Memo
cfe30f33e5e55a182c639d317a47501f12198a3bf95aa163c8f037859414dbdbb12897cc0878f3ecb8601e4024db599b39e50b9a2c18e39117be8b0eaf1f6f9d4230cbf62d48b4adc2b78a9412b12eed4219658c9169002e4e4ca0c6515815e574e8cbf39ce816c03c1c4c59453c80bf6f8f7daffcbd6cce157a4ac8f35dc3f7 (encrypted)
Stealth Address
acdf198cdbc2fca086136c1b2180c88e64dc92783644317c7eeffdf0e83a316c
Commitment
1c60e93b03be612a8c2461b85db9723cb5619ff0b5327104860200a7867f5f6d
Range Proof
672 bytes (Bulletproof)
Memo
e260a6af8250499d87dc386d8658a1b3c46a3f35e34c7d216ed00fc418376c3a53582ebd99eaf1aabb16eccaf80aca401fbac2d0552136762457cfb3a760ace3ae5305d15fc9505f45e2c1d11c825bae9ea01bbb3b2cfdf5e2c65f234459423a11196b19f77ca9a709494a60dec311d2ae81c4755c46b9fe760cf2525922f96b (encrypted)