# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
2a264612007344718219de6afdc232047be2d577cf1370151804ba9e63c68f4a
Pseudo Output
247fed9fc140069cc55c843ccd46c91046ac0463e03c68e384af63bd3979f51b
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
582060ad385ca5a126dc89d935a846b6bf9d5f7ee7b5767834df521c49808816
Commitment
d225de5429a38f27a4c86ecf1b1769335dceaa25f0d03bb201dfaf80dd34c230
Range Proof
672 bytes (Bulletproof)
Memo
0d9bffe8e9d4cdf94068b90cb32f655f0f084a2d451f958c14480910f9aa3bb564d6f1043fdc01f9877532a6893afd3259f0ce71b3b8e4ef086b2baa8b591855cd57f8bb56f17a53cd3c052dea2f7e5033fc80bb1a9fefa3b0e107e0c219867127b91c9ec109407346ca57d3a990385dbe554f44c42f0b7ccb75b0e5e51173b3 (encrypted)
Stealth Address
d4cfbb971be5e82b435824c291a97da159f981edac068594d9aad333a99cb55e
Commitment
c0135bd2d1b6a45b7684f3adcf476b3117d09d57138c9696fd7defa1ae13a035
Range Proof
672 bytes (Bulletproof)
Memo
cf13b185477ec9b84fc6b99a4433401baf7982a1d0b605c80429ac4a3accb0f073d15fe18b566f21dcb330b125e1c33164093fce92b896380ae362128b260624529c295c4981159906e5cbf84c8e60ffcfb85d24a83a58592ff079f294a0d3f8301b5a2c89d2e48094e15017fe05b16fa54dbeb279d0eddd0bf95b514486e3e2 (encrypted)
Stealth Address
f4158dd92e9fcf240841f427b862d372ee392bd0bba628f40aa1d4f25ed0e413
Commitment
fa2c4ca288135368d5f546e6ef933ea8e1a2b3c74684d9ca2cbb2e7ebe49997c
Range Proof
672 bytes (Bulletproof)
Memo
6c0c25df26600772f14d8d6fedbd62c055ac626d25b418ee7826eca3ff4faadaa71024ace7506d3c901f5d04f757dcace0fc0506ae789058d63da5b6877c89d98e38bd7a94c6d09a893cb575e06d80d98fc4b2d17dae1cec8a002f4d884e849c49d7150326b9b911b8af8d7b6c0c487a11ad14bf21739104930fdbd00219e92f (encrypted)