# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
a2977e6305fcd6bd8f17624df3fbab8b64642780e5f93891e7a8ea4db53c3a07
Pseudo Output
76faf9af18f4e76b64dee6e530a2b68308c406e8a9a34fca9c54ae9a5b1d6009
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
1abadca670daa5702a1bec27b5aae3f4149cdaccf9f831f27f9006c04e20d911
Commitment
4c1b81a991f5c327401342825b6ee85d46b1fd82e9fd81b095cbc03e1b10e02e
Range Proof
672 bytes (Bulletproof)
Memo
7033db88c79aeb122bc7bba1b966719b7a61f3faf91474331b0332b67d71102d51c306821eda6a3122fb991f460d429282dd38c4a7cc4ef1b6c03298257f712e54b13acf176b40a427802fdadf62bc4ce56500d5ca201da24e4b40250ca05e0c67a38f4208ee12a371039559820ce72a2e9aa7a278afe8ea6cfea6323d0110da (encrypted)
Stealth Address
342d0b788c0d8928ed29a6da859f0ed03d15e9ecc11ec00736e7b4f6a4d7f826
Commitment
3a4420523984173f2ef260ae932780e8405c12aec36bac2551f0cc186bacf704
Range Proof
672 bytes (Bulletproof)
Memo
78d30af475e6bf1bdf6b33eae234c740084f3295fc309d04a9c1676b5416aa14a0974fbca35545a49a52666353fa0174033e7cef5e2ceb0abfe3565168308437de604ff786a6617eb0063ab350b610b1e247f96fa7c1eb7cecebb1794624faf29a21d934a640baee217c50c35b3a423f96e23cb04cbaef6057e98d325cfe893b (encrypted)
Stealth Address
34526daac4db85be2b8d36dc135664e49fefcb954bdce109f682e6123b221141
Commitment
1e68613a9b1d469d081619f64951f70db0e33b1055ec9d54e73a4cc772fb9e7f
Range Proof
672 bytes (Bulletproof)
Memo
348691faac6de2c1f0ffc7ccb38e01b1b911e4ceb7762714200409f14ef3df15c2a525dce922248edbf4da41c0105c2cebebd9286287fc9ce7b5656a09008764bd3e3c85744a17a22bd36fe50bd4e08d16ec8b9a40af58a332ba08c95b7dfc2af29a97953f5d5e04480025206c01e4b3bc99fcc267e5785f3b061bb8622a8bbc (encrypted)