# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
f6289b9b0ba4ae3b1f31702870c629a53640ab21616384dd17a5c5583eb6f645
Pseudo Output
a4e44cd4520be329c48f6e6d89e4a3a6d0b12b35add0d72b96d178fb157e7527
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
34726ed115691948279a7087b1b87940a3b2e0836744b1635cb767460d49e21c
Commitment
80bfb1110eecebe6c393d1eed93aff32bb20ced7cb4fcc5636738cbb2b2bf12c
Range Proof
672 bytes (Bulletproof)
Memo
00952d99f1e4b43ee5a8629e36839595f58c79ce052f33b7508e879aef78e68e587a7094347e5106f893afa3c20e5e686aa8437a7b832d55afa7b925a8f0f3248f7d16c0a6e6383a8ddc0bc27bbafdde8a7d8a17f56eac9b235326ad4ffc3528bd074356665623e9d9b8c26add3ed363ed46d7818dfcb3edb249115932e018a5 (encrypted)
Stealth Address
e497a775b4f2b08acea68b331b4dbc5a577ceb94113c3b9be96e498816340265
Commitment
96a83e554d546f6fb03accabef21e38ac6014fd0fb0db2a43dbad4b1e8e45b11
Range Proof
672 bytes (Bulletproof)
Memo
d872e23be994bf4baf54bbb27719f4f5b9c70fe604fc06874c7d2a96b69f6b44ed787fc2da1a142e3a4958bdee57b5688f9b070f70567519983fe59b39aaa54a4c053382a140ae392c2aee8b903c71bc4c4e278f48df810174078952e8d5571c94af6d9bf671e43d8cf3647658f6eb5d1425e1c44a91b58e5c55a095be9963f1 (encrypted)
Stealth Address
d0d0fa097576b0ae08429ff7c02f11e20543bd61eba925280fa8a3c182cd9058
Commitment
6274e6ff9b85cd6eedc2731e73fb22f6158e8d571f5047c6b206ad8204b10f43
Range Proof
672 bytes (Bulletproof)
Memo
2cfcaca153951dc97a8ffece9045c801bb74c6f7d7e5933993a12937a755bef19ce7780fc7ca093f9e42ab479368f02e77d96b872082d1888b2f3469d09b71b8c2e1910ca9a816d2e5172a851a03fccf99a21b3223ecc5457348351d28fd49a08058ce6028d4f1a72368dc63cd5cd84dbe1146cc05c5f419c73d00ba2a8c022e (encrypted)