# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
f0e8b994797d45aebf02464d3ea349101e391dc4fecc9b7a2aa6ecdb637b2f01
Pseudo Output
bc4e5f3795f6f0e67b6a4e5ff7eba4bbb0e31b07531b58b8ee2bb090b10c5301
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
e254ff9a94fb004d8d07e0a7011c0c037bf966f34a3d294565093c56f4172170
Commitment
c83e2c6a57346ac786486f94b1661c88f9df0b4b4d9b16d204ff8f76b0133d50
Range Proof
672 bytes (Bulletproof)
Memo
c0fd097367950cec673bea83586529be8d2c054b750ab26005b75655c7fe1ca7e8055fa24412c108c1496a4f239ac592e914628bc0f0fbac6138e68d529a82b2fe8efd295ae168da57c5dca7fe8f209115a577e447e738626a1a8de290fce9ed0a8e786ef6c0c1970215c5c0c84152822c9ab4f12fc9bde5ba7b58985a779db8 (encrypted)
Stealth Address
0a3d46e881060c3280d44b516c3d7ed9eae042647346f57f20b7d08c92e6e948
Commitment
fe48c670cc1a845c7314ed5000103e693a94c05121e3ee8fc3fff4cc3f301341
Range Proof
672 bytes (Bulletproof)
Memo
e4b37a16ffd1aee90d5de3fdfcf5bafdc52d4efedc78b334f6109b128d123a991cd67a03671af40a351f3604f021c3ef18cf464764be73e7bfaa8e719f62af06e86c77fb4ca70d991b628fd0bf25c9592873f2800736c4983a863a69dfcc435ec40a7befaa0163851f27d50a6e06cda934c2aded3e2a4f12a875ff9823b3cca3 (encrypted)
Stealth Address
b823830e0bfca09822d2182178784919b7d115ead1482f58ffd7b161ba50581d
Commitment
fad091ebac75dacce6b6699c6bca581e001488d7ed2833ef062934b47d0a2c26
Range Proof
672 bytes (Bulletproof)
Memo
c2662ef0adf682b6f0cc228d4407d18c83e32aea89ca5288d1419162f4c30191125bdb4e8bd0b1e876e9f627cf396cca251d84bc6a8594d92d75875573680d4457f019d1e336e56b22bca56fe38341e7e1b750473aea33ef636fef53698be863802915965956f911e62b64ed955a631ce80016008b178d3ad8e7645fb04b7e40 (encrypted)