# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
72b01ee3ba9a3a4673cc31e42a8c007eead8837ebf01164bd3fe8b91df3e0415
Pseudo Output
4e0b4225923e93a1f2a7dcb1d1d02bf7c44b6010368b5e7099cd9605f6d87048
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
d26886b75403e1400c65e67d1c412574e6a714c5e0dfaf4a7a7621ab74919f11
Commitment
d2909afe89d7d5061ccc798b5665d061f46479b81884711e2713e2a6be7b1e50
Range Proof
672 bytes (Bulletproof)
Memo
9eb56e0c8b6243f11020c5202af7aee52299fcb99b84a9b24512a48f0b15187770ede5fe83d53a581ab53d1dc0d01bbe6abcc3a581b560c483b069cdc019f9edd512907f19db335844c89e1b66e806b9fea4ecf6c12155c87f4ae832bee1a871ebfe72c19c998782996975c3b3ca8a8aec37c14d1b13b346a11745445ce2991b (encrypted)
Stealth Address
36686a1e90b3df43ea61471eb824d76da57120f5dda80608cd42e5f5148f5c68
Commitment
6e14acc6b7bfba0c0d470e4c928aedc800f48e62d1c9cce5960fb6b426c54803
Range Proof
672 bytes (Bulletproof)
Memo
0e308af06c3e33c71d5c9b5151934fb9d1f32fe32a1ad9aa8af80389b70ffd797d10769bead01f18d263e697483d1ea437caac6392a205ae0f363fe32ef3b6a0312bba4779570a72e1512ca558dcb93266993923f292040a1064d454956c00e18231aa9c9d444ffc21535b135a53924b7879223d5b43acfda426a68cb8205e7d (encrypted)
Stealth Address
78128acdfc79232b89062a1a0bc4e25a4602dc011f5df448203db9b40d950b34
Commitment
1221ae2086b7086d9d3f5eca02cbc54075328541d381de63241ec2c7893a982a
Range Proof
672 bytes (Bulletproof)
Memo
0a4e6c0f4cd7339014b84a20b1777a963e2d0b4a048b610486f17327615ed3189dad7ac8ad9466ad568c032b319fb80cf9b09eeed9b405876f0858a65768c92889103169a04b6ff449733d99cae1e835ce7d75abd8ce27eb13ed59471338bdb1ae5886d7a558f741a54aa459a6d4125ae9a4dc882eb489a48e30747e16c37d15 (encrypted)