# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
b40429c2cc6935481770f41f4e3d1dba694e0b2f88684288cdd0e38b7d20cf60
Pseudo Output
3e40e9f9e8f56781ed3863fc2ab47ce5de053a6ffd9481ba8facd0eb27a00456
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
e4833601da555e157971e3d4e5f164d1cdcb20621b49dcaad1ccff13ca33b623
Commitment
1ccbc41f95f40d56209957ca68a43b85a163502703c98084772f092f86a40d72
Range Proof
672 bytes (Bulletproof)
Memo
f32661864bd5b30eaf0185bb7122c94ee539b2658d9ac2d3eb222bff0297050f11d7b00aa9749e9bd5729ef313f89b8fea0011c31d628414edec01bd846aaa9e85b4ee708aa7cfdfdf64cc55b0d413af15afdb7bcb81c44fd4f022164825f2afaa9724ae5ef65a210c1b8ab464e3dddc4107397ef82c45ce6cff5ecc75c31819 (encrypted)
Stealth Address
529450f53521f8c7f8b7c12b173f1a2b3bf1d4f283e23342705899479862bd0d
Commitment
dc55ff1fbb930293cf4eb09562e4db9bff911711b83320e91e4fb2f9ef177852
Range Proof
672 bytes (Bulletproof)
Memo
8c19ae0599b4a89ce83343f7d845cac991cf2e7693bac9497cf6000aebc82f0ba8b2a4fae77822337585482ccbddf62a7084615447aca64a86e2ebba6e1f42152ac5510f3025a259a6f7db27bc6ab8c9a8c22a77e0b92e5b560af9eb0992b5994ce07ad5b06e7780499ada77e73c5af75df286069f17345439fca4540a7dabb5 (encrypted)
Stealth Address
8407325e6d2b03a46000cde88b6c3edae3705a162fb84f0ea9081158a76b4860
Commitment
ca2110892f7a1be3e0388c303e8198a4c5d435c0dd2ccc5784d73020e293cf3e
Range Proof
672 bytes (Bulletproof)
Memo
1801240e90d13a7c3a757d50cce7a0a66c41ea11996c238d60299e952e5d1dab54a83e31c64ceadd0b81376d5ea6052b0b8aca6d5a6844f561587d45858e8608a24951975d05dbba45a1537d99d01e412fe8ff77d72db1439ccc6718025b98e2d848dfc6d424be3d0aca063a39e168c836840bb410fe9336f6b1c112bad169b9 (encrypted)