# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
0e3f4c9d7811206859149280d69e35391070cd5fc6b36861f6eac069b34aed75
Pseudo Output
74ff1c7e5eaffbafe9c9d2a75ff640652d0aa06fee8d198c04c747f57d2cff72
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
f87a68e7e2a56180390404144f34253668e36b8b00a0067786838e1b4e8d3320
Commitment
860780addb00276291f4a461d3b1ca7ae93dbb8185e0ce6d3672eaa902c55238
Range Proof
672 bytes (Bulletproof)
Memo
83a2394be2d95ae12512933bd926c809b277f407f18aefee7e5bb394e8d32ed119b368b2b827341cafcd1e0e4acea895f41cd1ca6a9b0758c38a9d04e7d9959ae83b0b8f1cb77cf65acf7f1fc8dbc7f53738e47aaefaeb8eea011f89fd1cb6cc1dfdd10bce6a770b6dae45957e8e64814e942888cf1839e87340fef6c75e2374 (encrypted)
Stealth Address
52c605068724800748dc89da0f5faac9ce50df8ce00aa0b239fca0eb857a395a
Commitment
72042899b2523ad650549cc38c921c05e08498ed4e219b720de364efba98181e
Range Proof
672 bytes (Bulletproof)
Memo
c2d6220cb4e020b4bc43431e23f2632083e5dab7bc2799d4c40ad082b07575a1d28a11d8fa7ae83df38cc2764aead70ee75a5c7b178d02fb54fecc103f2ef44123583b95217f9ba0c1580000e1b84deb8f6f1e9ad5d2671f044d7110c7463c9c2149fad8f35424d26e940dadc91b50c80599c236019161aa33a79c15ec2c83d7 (encrypted)
Stealth Address
7a3462096e03cf0352c31733e06881bc6be38fcd41b10127736b62c0b80b3b4c
Commitment
daf9774daed72e927d29626acd303eedc4368c89f1f72196dc2ed190da57c422
Range Proof
672 bytes (Bulletproof)
Memo
659568073da1a728ff541069e684e924f68dccc5a81a0f76aa5f413151800f8528e6d94cfd6f7275d7a997cecb253931eabdfd9b5ff91ae03f98fe5f78b019b1de16596dc252fbf693c679f7c8a95214ae9a2c68a93960d6ab1ff4f901fcd691c26ddb7631131bc85995095f00f13866a29d9f1f7d0de0d2b5379c0e82d9da95 (encrypted)