# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
7c45387cc977f1557cb01cb83792d472ba6a9c95929f5a4917a8b0d6e6219969
Pseudo Output
1e15395419b1f5240598c564b13f4e000f25ee950d25c83565da37e4c7de7468
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
b441fd22b86d5047aacd71b30dc551d3114a8852a25ed1fb36d22ec2c1eea826
Commitment
5a1c6aef84a25c3e170b42ef748f7873e96102bca1180086f926fb8fb5cf152c
Range Proof
672 bytes (Bulletproof)
Memo
c9bcb0fa49e1890a9c48e5fd605817ec7906420ff17707399d06740765d8230e7c0a3f9fe366e1e7815c83177f1edeff1531ad632ab03b9c7cc8c95b514ac027a13710a3bd9a9127355ec19373907c03466d490088929d8750b2c40a71cfd22e76bda08c032f4c2a8d4b9a17b72c31c458f0684b83cffb5f322331f579b218ac (encrypted)
Stealth Address
b884c15f90cc334a97a66d1f980ce7ed5ab2fd06aa83e13c9a7f4f398bbe3a7a
Commitment
d895282defa12b7333860b145bf68681c7540435ef8fced68d039a3cef662c6a
Range Proof
672 bytes (Bulletproof)
Memo
72be9c832f1691aa78c7a4d5f8cdd75fdc8cb3d2dcb71db1cb663fc5d0640cb32ddc913d8c83c78ff0027d09ca79d02a3b21844c481b2d02b1619260528d2eb784f9531f91781eb58873ea68bcdcf9ff7ad4158349b56b2dc98a110c13074769c969bdbd0856e211e6872d580ea91c754bc32df54ac7645c1fedd82eb360496b (encrypted)
Stealth Address
4627fd3a8a3e58c01e6993a30a700609879649ebf2167af6c213cae36d1e6009
Commitment
58fd7f679a495f4b56c1ef896d4c1fe944f12fa94ee2026d5b66e587c842dd1d
Range Proof
672 bytes (Bulletproof)
Memo
64198bd19c9e22b302961334fdec91801e9a04be18c5d1fdfb21dd3f3dfe61712eca5f7e2bf7d9802276b932971bda830281121d2de267afd4751d898b207c385d7b93a9263e6e9607dcca4bf08f2877a36c299573c141ff590b6361cf83a7308f37d3905b32f4bc045dc1e150cf913693a9ed5c48d75a4d218c785a9662f108 (encrypted)