# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
64a01e0f74cc031d30923f901527b5283aa505202fd74c32a112de0f1c05b878
Pseudo Output
3a04e4f79b6644165ea9001dc0519fda6f9226a8c8b866ca6c203d5b77246921
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
ecc5fca01b20937df65d097a6c7e0e567fded862d59fed82ce3832d44e68ac44
Commitment
ec0d140bc627b6607d2aff8253b0e816923a667fe93f90e1a540357227f62a59
Range Proof
672 bytes (Bulletproof)
Memo
99bcde0e5667df62d1d71f33b07976b3302d49ad9d8df294fd13d484ee012f9f457be9332bd05ca709d1202c284e2aedd78b469a969b5105ce097512e9b3a05049d914a52944ea5aae3f39e14f1eda948c3130200e8a76e1e68966506bf71b3013e22de0024b4bff46dd712465a4a54be2fc9f84ce00abc6a2e638f4b43016f7 (encrypted)
Stealth Address
7c9523a80a8694c7fcadeb0d300133dd80ff7d3c69ffc5a4f74b0946e4833050
Commitment
84d720dc9f550fb7ee2e7e663c58a5e14dce1855debdcee4694405e2568b1a4e
Range Proof
672 bytes (Bulletproof)
Memo
8d5fcf45e70bc020f5ac92f5fa1d6e496078c9097a5da7b54b38b9022dedd69c43d7305d2ab1cb535c0d7fff5267bba7f7000e11064a7018b9a82e60275a11f17c47cd4b08c847adc08673b70ec0877959792525dc653eb08a2a143580a379d48a5bf07a20e3dcffbdcff2527a2e2bb42ac9c60490b8608834b4c3e89a4ba309 (encrypted)
Stealth Address
f07446b2933b7cf45a8b46710c42999773247abc286cc833357e2cb077ee4209
Commitment
e024c70bda193e18ae797695815c6fb8d7473425e7c3e9d5ad4534ebbf7b1573
Range Proof
672 bytes (Bulletproof)
Memo
8ac9cf925f3bd5a4aeaf0515caa9619b85d0c8150903c9c9315f526bd55294b4f2f1d7ab86fc5787aa8e7974d99c9aa4c6eab6bdbce7f108cd3893c3c24b31c04b353a4a41725098902861c3852d1cd14d2edd0744afb2b7812c27c51b822a19f534da59a71480d7fbbdfc0c54892018b99fe16fd0fd5d6cee662bebc95469c1 (encrypted)