# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
a87c026aaf528ba9af00c39bfa032f6af77c5571afa50a000f9a2ca826529f14
Pseudo Output
e4a6374916a6e1d91740cd21acff1a5930b001d3861ac8b2a0bf8667cf946607
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
7a434d540d3c1538e4dc0f74a6e8e952540c2a6b8a1e5d97169facf8b3baf762
Commitment
04625096fa174171cee4d4cd67ceeb095df3aafd227b6f4ad7b45da88e0b4041
Range Proof
672 bytes (Bulletproof)
Memo
a83c634ec5ae2efd46fbac82b75e0278cc2ce61afe097aeae5dee1b1e967f728d9dab1bbf791a0b8536c17dd7edcbe1f4520b54a1a17d7f4e5a1bcb47511626f3b37f0259eec047940169ed45c1fbe40bd97dabaf601d7f3569f3d1e766b2aed91fd07e50760af6583ecd09230353605d0cbc9f03a56bc2a16c13f447a996dc4 (encrypted)
Stealth Address
3c61f8f22e551580bd7ea6ff9f8bc5e12179816ab665c12c45c8a14c555e8025
Commitment
f480db1cdc154bf037f27e85c0cc1c581575a721bbecb4f61c1665284d61e10b
Range Proof
672 bytes (Bulletproof)
Memo
afa8af6a695f255072d2b4f1b54a325afc792d87bd6eaf6409de0f4ba0bbd95bc2c48848e390315f477ffe7175bb87db60612cc586a55be94b35585d631fc6420f98d5e567e1e890abb20a48e3bd66b2df4fc4038059b22226246ca00a78ddae38ef265b70e9f81c01f97b127e17887ecbf71712669a9b153f492c9f9cef8fab (encrypted)
Stealth Address
7086c0e9970396e81d21005a2f7e862369037897c6d607c551e22ee763ba706c
Commitment
3ab5567030558a49f6f96899b20a6eef2368104e3fcfc54eaefec59aae42d53c
Range Proof
672 bytes (Bulletproof)
Memo
0a71be265574d67171da40271dc353dacb1bd36812073258364f45bd2dea773c43892e3b771250c21526f4d99c7d625dc02fef4cc36f59318e6d30fb7186bfe2b0d40dc220fb86bbec5d4c6e134e32cbe5629d5d0977bf3f30ba6d9cb343a1cc1cf40fac7f4eb501a3cd1d06267e5747bcad712d1b00f409e20ca773acb06f88 (encrypted)