# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
76c707e91688a5ed6e47de83ba5febf388dd0ae71be2ecbffc99f288372db854
Pseudo Output
184c233a49e1d88077565ae667365006896583e5e8505c0cc4f063fd4c128a1c
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
8455bfb69612394fa5293a0378bfa3c1a959ca5ecd528f297ec7b56ba2887e63
Commitment
5a693526921b5e25e7e8e2930f6455b52de064d6b598c1ad1eed28f486c5032b
Range Proof
672 bytes (Bulletproof)
Memo
6871f8afd3781fee180cb5aa6d83c254ab83e4bfc0fb7004dcbb53a1827b71d867dc03e7dae6d77e1a22a874a8cdb67244cba6531251ca88029c6be38564e0badb49f2bdd1bde44d382e657687a8a67d279387ebbbb2b069cb8490fae694dbf8a02759d73ddd749227b5031649b9d7d221d411e87322f6695b3fef8770451fef (encrypted)
Stealth Address
6e8099e0fd06967238d4294a13b34e983e4eeba3a074e99df4318bc6f392d448
Commitment
967fa75afa094aa7e75c6741c33da2d208de1132257ee0087b0b5f8a0f472e7e
Range Proof
672 bytes (Bulletproof)
Memo
38e27dfe7c22630a2d418ead5b22e336ce736c61836ed664b5d9dd869a308dbc85d0cdb9a9f70a5788c35aaa05789a03e3cc09ef38fad145cdcde6ff01014ba218b17f5725b457a4ca5e94d171fff61a77a761b2434a531612d20360e16512707a2524b264d601c25bdba34bee3f45ad83fecd073ce97229676a1e30b2097cb0 (encrypted)
Stealth Address
f44a8953e7b978a92e32c65b6ee6ebc9dd39e025ecc499e3f0fe3c624aba8e57
Commitment
10e1b5a97b1b0366efd481e216b5582a4c74457a38a8b6f21337fdf8f26d4461
Range Proof
672 bytes (Bulletproof)
Memo
0664c5b1b4986d70c23328af8c8df83c39b046b55a39187031eec44d523b2558bc46e61ae145f5e0da57d28eb48ca821e58a3df9f0bc9eba7f44160fabb83ec0a9024dd5a241f7ebf112b40b0e0722d0bfc142b055656d142c0c8405e0d4adfff80ed915baa28f0c4d12d5fd6c0cb2586e088017133a3d31670fe0883fa26eb1 (encrypted)