# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
9af3e75ae8826f87ba875ccad9c0815cb07bf529b88dabb144cdf01fd3144842
Pseudo Output
d097f8aec9b21e2b4f90a7fe00aa9b2bf6d7171a4868fb50d944f67d3c17607d
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
9a71bb73474f362977bdd5bb5b4f8b1f7f2c9981cdc7446d13403f6d6f30555d
Commitment
da81d3385459d884639b734a0846f3e325128cac774d89f505de65e741e5633f
Range Proof
672 bytes (Bulletproof)
Memo
53fae8a47179aae8e9b2dcd531805c46f58249dd0cf3b806dec3b577a2c4f8ed50b326058954dd6237c2dc4eabca047008f5acf250cf82cc1f99015971ab0d4418fd07310c503292a76e7f6b55995b6550f402dee6507c162c9a445ee1a490dde2fb413de7abf9f8de1264e02115e46943d6c1a52f073ec44ece5849c0e2f1cd (encrypted)
Stealth Address
20d0f380a271f3753f86efc05ffba13ac2d3d8b4b453084d12e56c9c4d31686f
Commitment
c2f79d9d90678a2f0c408204c722c91a7171ada05142bd30992cc5caa0cb5555
Range Proof
672 bytes (Bulletproof)
Memo
10b40bc0e33c3538ebe032f1cd8e5e29b0ebddfcac4bfcec93d7a6e8390e962c9450d971393c5a91b4f73cf94a45a6fe553aef2b8ce75b15ade9c38d7c01c0ce67f94e175ae1881c7cc1ba4411fcbd5260b05403252f10c3ec6301a8dbea3b47e4598f86c5102e527a4f41606141bafe9883079a3f703840ce064e70aeb1cbdb (encrypted)
Stealth Address
0ecb8f7b4345a50f3d22793eead1dad6db72a2b38f355925968b66577f140543
Commitment
b218f4cc1f33373a53d12936fc77701477ad2af3efb71af9dc878ef578466d0f
Range Proof
672 bytes (Bulletproof)
Memo
c772ae0b01f9818d43232e0f6ab22b5e33d10b2e891e7986fd32448e718c324192e41fb94c668dbb01682cb4f597c37e9c68e8c619d5310863e2a42726303d34c889a16ea17c5ba105c133e7a4f7ed7c8a4595891e762f3e33b90ee2d250f406343c9abbcc2f8cc43641313037a47b1fbb9b8e19c187af1e8a5ea94cb4e46aa3 (encrypted)