# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
2e300d057e7b20edc1d4d2b345fc238ec6efe2285783194ab9206e1b387afb1e
Pseudo Output
fa7e4dd453d6cc728b66c672d6f837f66993b75e591ffd4dc9a90d1a4dcd0e54
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
0607028db08613885f65d6d71a0b931636cae5d89551a2bb47d2df68a8d5ac10
Commitment
a8d184642a1bbb756f833c620cae482359c6345a74f70d77b4fdd5c1fbf6f561
Range Proof
672 bytes (Bulletproof)
Memo
1e7734098c2b140a680d99dbca2d6784ea29bb7348d1e6803a53e694d0e2e14bfac2c971bbcbf2c8288c1286d5202a3eafa1fe44daab8c4a1b23f1c0466ba5e054ca0c157b3316f61c1636d202836aec6183e69c00bf7e507a3e43ce4ea407c5d364df8a1df1b4c67f0ff6953d3982f04834d72d100a31585bf3457e10b8640b (encrypted)
Stealth Address
ca77a1dff5e34c9d51cc0b22a9b252a6170818a2137b9619a671982ff131e823
Commitment
e235d155879b543d41b3ee1c9d0f383f6be440d2d395a8f50490eece6bf29f3b
Range Proof
672 bytes (Bulletproof)
Memo
74322af7c2d34e4703ccb0be3fd47a0713d4c8ea1127595055e9881e41d4af8c45d4ce7912150adcd36f7b2f7484e5f558b19ad4990ce0feebc14f583b5c97f2425bcf272161cef6a23ab0d5b3d67e85f82520d590a6a09a1d52d77cb009872aa723fd99b42f758444eadf8bf153648e7c135f79eab7580681f2e06e122860ac (encrypted)
Stealth Address
fa54cec37f671d32f187d54eb7b56151e8dbc36ae64af6b73b19ff0a88db9754
Commitment
9028d366d7c9953b00623ba96e8e3af11e7896a9029d9571b914e41a367b9842
Range Proof
672 bytes (Bulletproof)
Memo
f9e87ad6ec1ec3e50c3ae556b0a0a56ebbf6e2e51e9ee1233f8e3ef5082a58638f4a8734f8e945e7f08d59a9aa262f63b7b70b89f7d8c44c9839266cd4d619df9e4159a62028dca4b99ca2456b0379268d1ad34a1045df6d8c250dbed16fc3574879904065d3fbaab51bdc8b2527a7a37ac0ef601663e24340ba1c7cc7e58c38 (encrypted)