# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
96dd9f0c04f1f5038e881962e207ca2df32218acc016b80a77bbd6fd17987761
Pseudo Output
7c6480b6714be696c0a8e22a39ed9c74e893d4e6a9d3e5cb47be70c0c837741f
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
9e7f14372267c5dfbaa8ba2c84c63ffa01d6c4576e048ee7dccc92d8f753b33e
Commitment
266444954c7fbde2cc036fd6c099bc9f77e2e07e1fa6965c7489759406e2894f
Range Proof
672 bytes (Bulletproof)
Memo
539f2efba9864ee620159794566f411c4c2045511bff042d3ec67bd0b74f5538e33938ff288c1665df924b887f7231fb91507f505b64b38ab286fa463b68caad6583323f59ac03fccafaa9b48aabee350c5925cdc3b273f58d8605742921ea0e9e819d64aebfb7a81e60f06b0574fe69a0b8e8cff8f4d0af661a27e366abd3e6 (encrypted)
Stealth Address
b271df911cbe220d304a57f828f1578d4fdf30977972abf02c2205a26cc08704
Commitment
284a80e25252f258305bf6c5c521281f06311dca322b81e24f3d43852d73456f
Range Proof
672 bytes (Bulletproof)
Memo
fc01c475c895b01ed2f3cd6c3ad4f99d24e6a5e0856c06b304268ff0ed21ca924f73fbfceed80244e0d3b079edd4e6d98916395f2e629bd5a0082503076314b749891a32a3ee300275fc8c28f88c0fbf880b8edaa70c4d5f1ab5b15453cbec3a65570ebf9fa8e0559701ce6e772f504f8cd6c8238b10db0a8805888eb99164dd (encrypted)
Stealth Address
9cef7425ea2e4377fd36f276f17754e4b805c31d0b5918c5ca7ac63b98d1db25
Commitment
28758caf63dfd63746e931577c17ebdb7a61a229c1a4d0f67c7dc8436ddb8556
Range Proof
672 bytes (Bulletproof)
Memo
ca4a8e7a245caed934d8c5821a0637a3b55aa1d404c6415b86195c147c0ea9427712a5e8ee57d31ceed77f2517acba693216a63a249c39665e24479a63b06939b7d29972d2ac52da31fd8d04ff29c19813444d92c82c9895cf5de87562de396d6b36f7e8e97d36cc85f0b6c1a62cc698fa497c27d7ea2c1a55ac936b60bb8a96 (encrypted)