# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
e25c7275cf2aecc3cf8d6aa3867c38d6ea1df8faa17b15c1a79a58ec2d85e87d
Pseudo Output
08a42ed0f5a70161d65e9df9a8f985f84a6c4a97dc4d164d3e9c46d7d3e92241
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
76eaa72720547c9fb3a6fc195be8dc32383ad908563efeb48337e5040d79e66c
Commitment
92f6c414b3e468d6b17411236fd2d1d198b5f80850515560617c563f8ae21069
Range Proof
672 bytes (Bulletproof)
Memo
f7433b7944db8992f12f3c3e68e382542a7301f9f6741dd41142a42ed0a5b95c5a97961bd6ed4c43ec72cf450f2ee80a79ee2a373033face58bd82d21b8518470ea0168aba2bb29be9d97e0459482c24c3291cdf7db3a851ab513490ee942e79f391400944cf94ba2d5dd3eb3b8e8a922fc3a2cf2e0a47bb5fa98b12becf3dcc (encrypted)
Stealth Address
4655ded0faabd30e63c53eb58eb269b237f537207b3909078e7b9cf090058041
Commitment
dc5c357f34d6dce23f603282f1dc6a3d55475cf3323738dfa9b283b9a204c31f
Range Proof
672 bytes (Bulletproof)
Memo
63bb6142356b2f1cc0ab6d14c79afda197704de58368b762b0ba6fa2f3d89f2bd2f382564509f2e3983f2a913444ee6467bbdc7958d8afbebf1b4481f2ac8ef02466b3c82072965310b4d322e5ac6a9667b7b02c48f5db0eb5eb94e8f69a3837c85414894ee8e718b26a8dcc838865abc906a997b2cc7ad753eca2de87ebf84e (encrypted)
Stealth Address
f0b862838f48ac0d397f233edd515d6be906f2bbdceae8cef3c86a3ed5a41e41
Commitment
4ad16e9d07c0a93c5a37bb1e9f7b2579855054a629f3b26cb309edcba587ef6d
Range Proof
672 bytes (Bulletproof)
Memo
b9f510b9d88926264b32b7e6cb129c0e1cfec2f56289c67bfcc91c974238481b9eaaa7703606df2763d7425f655100d8853b13ccce034a789c591a79daee1acff7bcc6a37fadda66a08f0d7d50b4df0b45ab00b09d548ff9fd5f0f8b13bedc2ea30bb7681050ab378c70b3f38f591088db39b4c9e2c5931022627b3e076cb70b (encrypted)