# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
be0bad30ccfe860bb7768ada3046a84d020501e14ab2cc47017060ef107dea74
Pseudo Output
baa5805e7dd43fe9e2603541707edbbf1c9437baf00e713dac55f54eb6082042
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
f2923d5450a444c41b75d12c098e0e96808c26b8adf51839f89eb592b022b80d
Commitment
1e5eaa7057e76b4683f932b9ad0d5d8df06a5423e1231ee59c74e7597a51af7f
Range Proof
672 bytes (Bulletproof)
Memo
a2235d9d034142ac97b7841b24fe28ef6881804aa29e1a9232945c3bf79199799ad627b40d8e313ce59749e9792cf01fb341b596c1bd98cb444928732c7b4b7747a985b9ac35776a89c1ddfbc12c983c0e097a26082ed46069ca56c2fd04e03f863bb41f716edb9f4461c9d1704ae9b5a24244b8f735cec33f5b2db7c1edbe37 (encrypted)
Stealth Address
9c66f4e64a154581e7c111aa50096de9895fe53a1ccf1ecd0981ea0bae3a8656
Commitment
444eddde3efdf086eb4911c2d223b6bc4a3cf8521ef0424aadc3ffb60e2ac56b
Range Proof
672 bytes (Bulletproof)
Memo
a4abc7623b9e79fe4e58c44c5b59ed49943ca527ccf1bbc83b6b11566549a0544fb4e8d1e2a509863e5dcddecd839ae149725e10e75723ef684416410d153d3e5688661790f1c66fcd07af445b46b42a174483ff2d4ae1026ecb6d0222a4df32babe38c1b8acabff1862d70c482c7b3516cbc6bd6a59f5bfc9427325071a4b99 (encrypted)
Stealth Address
983da9e6f04f008058a8f215d7b4682d7c4794e5f806fa775abe648dd9b4157e
Commitment
42bad17723ea9c4fd0d1feb55187676e95d04ac6e3f34c7455709fb92743a07a
Range Proof
672 bytes (Bulletproof)
Memo
6ef8d6993ef38372e30bf5112785df36c5b2bb36d919b91f355acbb8408d70f5d53be18efe41592007260474c333094a6db84f62579419adeabe1bb441688fdd9c1ad4ea1096f5e93a47e33684ea38014e069fbc59ca3eff36019232fc76a8f6dd7025c82aafafe28b272543b69e290f3b38bf5bcf87be86f4f2c78992f7dab2 (encrypted)