# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
c2b4a8d49e5d3316059ec7e0f50c870a3817f9daf6a842b02d2298b6eeae4a59
Pseudo Output
5aac9e95225e7e3f9017a8de39f4d9110de82511c29a0672f2493a4bf2755644
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
7a6559497b05fc849f288bccc9db4617ee973b2a72df5acd60bad32648a76a0b
Commitment
a060bbf933ce24ead2c0451356bf2928e1c910841a366eb2087f329553a39b47
Range Proof
672 bytes (Bulletproof)
Memo
d8875ff7d250597f8e5e21ec0a2e58911c1591896b81b5ca8da5a74db55bdfee069e1805d33f31d2ea2b1f2a8aea9977e4e7ac919d4415a2d4ccad9adeab202683f16909f630d0aa29c2f1a76af5c78a0b456771fe68c74f3d6b2f24cc5113dada3eea21d43b684d47755436682e16c423e6026e33eb0858c5c7ac101572b544 (encrypted)
Stealth Address
2a5b2206bb9e81f6fb5310404ecc7cc27361593e5dca5f2d8b5b5c6d33f0921f
Commitment
a49210492d8fe387122ddf378c4f195a57e909a2903bc720d7ef707b4a34ce20
Range Proof
672 bytes (Bulletproof)
Memo
1caef78273e9c23d783f215a348c497b26255a83944aa226a8ce8e246d9122394d311109b4ec537b16d083acfb75ae8eccbb42216b0c458acf1aa39334ed0780883523d6ea09b44956c4d9154dbc919f9690c7507c1e21783159004b34a9945a08120477c84a5f8be9b0b427bcf8d81017b1f42433fb6e081ae9c6216fdad8a7 (encrypted)
Stealth Address
1c45bdb438459052d10ef63b420a53d59e30e69cc9d22cc0f5f4631b300ce848
Commitment
de5108656ad2b407442edb7487ae0f35b070449c20bed37f26e5a9a7d394996a
Range Proof
672 bytes (Bulletproof)
Memo
43c80e22a8b9bfaeb4e542c719ebd58c107b3c77696cf4e957048ccde5cf62d1bfe292b722465455540393b98b127350e4f61af9709f417a39f3bc2e6becb2b1660efe5413b795b332b7b45be8e1fb709c6276c52d7262f21db49c12ccde9658e7d081ac536dcac3152d0b279db638fd0ddab59853b2bec4c03ddd571919267a (encrypted)