# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
3613a5410dae778f32a619b3da9abb3c1026f4005e3c7883611b321037a79e72
Pseudo Output
5ea57fe8fb600d24b8da83689b978821efb34b42ae7e3a8899bd38262f41db24
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
62badae11b98d795109260f45e2faf15bc7e5772939c0071ec60a7dcc8db0a69
Commitment
d6399bbc5218d640c7d639b02ec3bdf7c163f88d04239a5f70021191fcfb542f
Range Proof
672 bytes (Bulletproof)
Memo
eb6197e75ed33651a177bf9a55f85425a2dbbcd430a14d5226514340f90f19b461d9a2732a0aa6fcee8a841f1cede7fe0a6f6bd24c47ae2fd47ee8f0a18c3f0947feadabdfba9c2c23963756657cbeb971350b0cf1edacf06555971002f3b16a5733afcf5dc0063a2eb99ca81d495f630857570f575fbf8952b488e16d57af02 (encrypted)
Stealth Address
28e0e30446f6009856a96c2385ebd2a389981ea567613bb2cddb461b62b7623b
Commitment
58dce8eb0802bea2ec1aa599dc7c2dd650853f5026beb24158c7cee597228f05
Range Proof
672 bytes (Bulletproof)
Memo
e91aa19ed60b6b73329a567e546f1db03e2f71ad1254420664c1d13e43ce11a11a1e1abf7e0b035109400b0249b652ef4253a74c13c9ac02020ae5711e01374bbc3dfdc6bc298e7e6076c0f47b01480705fb701938d027a34f32ad3a66eb279ae404465e165eee8c634ebc1bb9a1de5aa188114c936598cc617ee62172e72aab (encrypted)
Stealth Address
6ead620b3eca11a5923cf62d5c9e8291f4511ca0aaf9c857691478c6f6b8057e
Commitment
56d10bcfba20d298e453a389e52da4f12914655c9c7adbef2cd15fa523aa5561
Range Proof
672 bytes (Bulletproof)
Memo
834e66c997eb03de759e3ac400da7341203b5253c7dfc74bddf7e819f34c0b322bacff00dd08201b7670a3f55f9a00e98c36f9b7944a94152a0b193a50b057eaaf4ea29c5def5f4bda212c4ee756dd16e49d776e0da34e5aea693243cadc2c514a9f0c5fabfe7b9820136dfe1da57daf59cf004e798fef03ea9ec128293dbb83 (encrypted)