# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
9888eca7eda2ac4f8de046db26c8836936fbbe4da45cc19364b5256d98acd40e
Pseudo Output
c0b0b5b1d9cf88631f5bb7a29f4840331dd4dbd8b962eb2b45a7ba2881ac4601
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
f0459c55938986a10bb05210e83083119ba64329110f16b3a0a8481186f53c28
Commitment
c8caaa9b6b85cc7c31f0dcba62ae59816b3a47c3f5064ccf1bf879a93ff41f20
Range Proof
672 bytes (Bulletproof)
Memo
8f05c021a558d1ab9e83403f96ec9250e72e3b846956d1eaa04a7c6b6f6b792ad0ae48ef5fc7e8e44759cccbacf1920f38a03b119996513992c4ca88fe0188bdaea5633a6a6eb1d576454465545b27b0b1e258c6a7471d3d958a8f78921447ec7a57552f52d26e5a5b35e6f7a3e98698568f52590ffc9241a269bf8e39285fb8 (encrypted)
Stealth Address
5866a9d2d1452a995aefcf2e595f72af82889ac018e916c175f0732262fa622c
Commitment
28153bb0fbce2174c9250c4028dc2b58ec55ca42e0b7a46281c0b55e11f80634
Range Proof
672 bytes (Bulletproof)
Memo
779803e71cfb4397e035dc86a8ca43ff7e873d269a929115d50fa7486c76507de3f1d9535404a9e3d7085a8e6731ac0823242201850c24ffac7ab85cb9c350a71bb99ff6fb18a100e92e71132089ac1a270ff386a4f4128f0380de8b7da1b62590c6b13b41464b55c57e62ca2989065e286b5e28acb2d1a7ba128badb193b6a1 (encrypted)
Stealth Address
9490ca70ea427f01cb2b55c7e07d47d9920ac9dcd2f58f5a2fdcd41328421531
Commitment
e0493145c3513ec3d93a4eb913fb879fe71be0150ed14877b6a2d145ea7a6407
Range Proof
672 bytes (Bulletproof)
Memo
b4644147b15acfb025d8a1f2a4a2beaf53764f8b1db05f993bf2cf00600138800e796490d6683a8a878737cde91ad574787dc58805aa9994186453e345610bea8f89e2de346f9618c1ca43dba6dcedfaffc97478ac081d1febe55ef7a657067e69d357aa9aec6a1e8cc4bc014fce25db73c051aceaf90b8b9e7b34233fd74b44 (encrypted)