# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
9ed765685246831a12d1b92145d2aeffee28fc0328b086e816e5936987a89a40
Pseudo Output
14e37b3d50ad135603cb6a2c5d07c3167bb8ca50ed0f6a01bf22c11e1c660c59
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
feae02d22b6d85f2f5714991e89257bcc3cdb9662c773da726e328e412f1ea5a
Commitment
782fd2863ac396396638ae3b2d9c8c569dd23863ea6300e4066fcf07614e8330
Range Proof
672 bytes (Bulletproof)
Memo
e35afd3c75bea40098c910b7bc74019e24619c78bb4ee4c6d4e19cafa12a93dbcf3ad5710d74d40bf34eec62a5677dc008ab67369128bc31cd928cd8cca308ffdf32b3a9184422b29a8fcd1c8278f3c24b972d2f8dad5195e8c6b44ea021a5208539cc14f7e43237f9bef9ebcebf11683daac7dfa6a5f461b3e792a3be719f7d (encrypted)
Stealth Address
325e21bb6abfe57b982bc91aa9c107ddf1f412b67adaf8d2657a79e041f8f104
Commitment
a6cad323bfd184bdef439ff13ed3d2a84ad9b045e7ddda37bbca2ddd3bb81c37
Range Proof
672 bytes (Bulletproof)
Memo
6f54b0f6f318747846fdeca0cddd1cf64924d334f4d1b066affdb5307ae93d49cb2df3b57ed0e3928f9fb173c8232e6fc0ed3c2c413a54a1d4a6ba574ea41a8d2341933477f56142b7139be0bb828a82b70f5e2937c1d49dd7b6993a6bc9d5ac1318d129dde928b01b41d585d53c1ced3d944117de78aa300f970a6e2b230bd1 (encrypted)
Stealth Address
c44910691969a1d995800136dd48cc4673df3fb59940320d4e13683ce31aa039
Commitment
0e20ba01464e39054aaf748fe96b7e058b23c5b8296621c25773945bd44e6612
Range Proof
672 bytes (Bulletproof)
Memo
cb07b65f9b41ae54489f71fcdb131e75e5335655538424e23f794a3a6653381efef4a8c4b74fee0fe1c99291da13fdf4641c91f55fb3f5681515a2efafa529fafdd0a370172ada2c3ef3f6956c3e5e7e779427478e47514539de53a06ffaad1522221dc82574e6e8d8a1504b67f078f47786d61f5ed66dd39a7067745da5663a (encrypted)