# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
748170b26b32ff8a615616c65623b321c7c6d0f04fcb5cd8ebc4a6af5045240c
Pseudo Output
7a43b69aa1d9f3970fc8c946de588e04c8ff9ae33701ec0e52bf27cce85bdd2d
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
e80beb5bc7ad42cdc0d5ea7249b264c8092be5bb291a45e217c0f7598953463e
Commitment
544b644075b25f4c22a60ca1a0506c933ea425975842fe729acb3ac35cf5e20a
Range Proof
672 bytes (Bulletproof)
Memo
c052a52c618ed7b1dc722a1778e09ee19a1348f3e43d5030f3f55b317991ddce90bb54f04027d7732e9db4be5ff0e76b7f50efae774ffd0416ae16e8ea8bf0b4c77f8c2fbf72c065c2698d70e9154e5f9523a0c95093dd4511a1dfe71533f65c17d5f41af1593e29a582236be7cccdc9bcc42dfb273678f4e1897120774fd492 (encrypted)
Stealth Address
b49f94753b40149cf578f859197353515960d128921c8806ea9838714d13ca49
Commitment
404bf2b2f254f32f94e851578a807ce91cc4ad3f76715ba1c1ed084c12309d0b
Range Proof
672 bytes (Bulletproof)
Memo
60348605767b9816480e3315b9ee7072c173d47d02feaffc129d70b238761046caf6b0dd2f58cb9f746b52f9e7569a4c0519f2a696177f613b819bd951571ca1d9f6fc8cf6aa8a16bf836f8aedf73caa7d03dba6878053d1d35a34f9cd7cf98fbeda74bdc924a31878d224d5980f98fa3aceb420cb56b50eec9b1cdc2c36bfc2 (encrypted)
Stealth Address
660beb97cafd99089ec168e23863e86624e37a2cc508a5034ec2cd4930fe933c
Commitment
568d2316e5f4cd3cbc8b5e4e67eb1078d4066aa9ca1471088b50dcb98aac8c26
Range Proof
672 bytes (Bulletproof)
Memo
1c8856211099ca1be74e2a06a3f932299c58045829c0da8071148d8ca07f0a8923e293ac6232ead90059ea47d28861bb9bda4757e01454f17e43921917763b160930475df843609b3c8923a03a3abcdb2a2b0aac3536a292e59109ef08d670d7a47c6a1a885257c516281688ef7667316afe95b92539a3db5cedfa5d086c9ccb (encrypted)