# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
3a71604d6601e654a2c2154519f8585a455fdaa39e668fe7d4e4b7a1f0e7f838
Pseudo Output
e44a4599d1a3691f4a6206947ec6b2ef4a9abc0d9afd9fd25457dd4ddcff195a
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
82ec2d73034f9f9a4d16badf94a040a1e458241acdf0651edf70332e424bbd31
Commitment
7c6e97d9503e78b92841dcff12f68ec16ac2628e0a244afb4221dce668be636c
Range Proof
672 bytes (Bulletproof)
Memo
03a7b4457eafd5a3d988d6c273dc343e38320d079d329dfd6d642dbc8dd381d1e7cf6790c26181d50a0af15228308aa1204dbc05fae110e0d1807f20ef401c9948add82f3dc5107f1a059e6e3ded5081fa82f37d266e585c6cde2600a0ae25ffd921045f441edd58b0313f17213b504479206dc63aa155781a5cf65def02c3ed (encrypted)
Stealth Address
008305f03cd2cf736748b2d996560cb9b52c5d9bf8aa6af2dc86ecdac50be964
Commitment
40ee973ed276d2620902b4731d22cc5fc57f30845dc4ca975ac5f1bd80071e3e
Range Proof
672 bytes (Bulletproof)
Memo
79866a36fba5aea380fa7a5f3bd0753de2ef72fbfab28dedccc8d15fe4d8820595b763e449ad9eaa9e07697ffe986db18569e037c2cb9d7cbc39901cef69f0dce44042073f65d8d62de91977fb530f0dc9bebf7998d87bdadd8f857f39192a12c45010d8b1cf968bd8185687ecf9f2741b3e19ac067f873db528dcc3863204f7 (encrypted)
Stealth Address
6e5536b03bed2a54c0cac1d92f118be4adbffc2c480b2a42cf255860eb74580e
Commitment
14c658d5dc786f47e91c26c1a3136fb8d4312af9d6ab467690ffef863c99de02
Range Proof
672 bytes (Bulletproof)
Memo
72fdcec69f7f6130bca9fb73584db057337dfe307e78b07c8e6c2f98afd6dc08ac554a0107209707b06890dd21d6b9092704204b6789d444e0268241bc379f4c28049637ae4e32952a03a5394445e66f7e123d7a9bfb19f59af51fc74de639686d005def9f7d66a4fef38d38cf7600c7a2397ee81e8fb926d9cd724423cb81cd (encrypted)