# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
9ed40a7861be376c981ef23ccf77ba09a0e1616c97a2134e28f56cc3fe728567
Pseudo Output
eeeda14203db93f6f8ed4bd3f00e59ffb98870a6addaf28e0a585d7e768d9b2d
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
9874ee043afc638d7774ffc041a5385f3f3cb4f1f9049eecda99da75e528342a
Commitment
f2d19a24399c2863919e0942d8f915862b8e964176c26b01db29037408136474
Range Proof
672 bytes (Bulletproof)
Memo
3746277497bf7fca8397dc785dba21ca4fc935d91861b3ba872ca4e4c959b0aa9d992f5b654bdef6054d7a4bd6f409db59ab76fa4bfe3e85b5cca36c3c70d1556d7416487282a0ae0d28d13b4a593b74d8e46e95cee8974d444a82d2e7320a7f631f018b9ab47da1ec7dc4d55ef9cb64c6ebfcab97aa26639bd6bd6007eeae6c (encrypted)
Stealth Address
a673d6f74f0435a244becb7fa5337d0b6c9cacf7e740f94450dd45b891811309
Commitment
b885494937cbc03dc286d417184426482307ca315b418d43f960058363daad1e
Range Proof
672 bytes (Bulletproof)
Memo
924b61cf9e48834147bd4bf982848cc40acb7a13df67473c2d9c718e19b290e79c429a370bbcbb246bd3b299cbc92ac9207190f649deff2434d2ed9cf79cede8083a00664a3cfd8d428d10cc3ea726a31c118263837421833896270d0e3f3adf3fb13a43497cfb6cee4bf7f51fb75d3065fe9fd52b1ebb6652266d6dab411d80 (encrypted)
Stealth Address
b66d40e04c965e812388dcb978b9dddad68f7b50a8e392781170a3460fa2196b
Commitment
884aa4213a23fbdda4c0bf1e01c98d1bc7fe37bee556dd1f922de9a897897363
Range Proof
672 bytes (Bulletproof)
Memo
d0a93ad2c80e803f9bf2cc58628c0bc98dd7b247dc8b88fab1d672ff3c5bb8968b7fc733060693e34e15c5e24b346549303e6a8fc1c0e01ba44b62370bb313b2809e9fdd5fc362e9407ab62cfb4435fdb8f503e226169d3ed0d45605b6a3ca31aec8d4a85c90933f34cd45bed36432e1f5603e1d01ef4e0b237cb20ae5f3948c (encrypted)