# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
4e81e6365600f774dabe218da708f0f25cd8d07b227508f576a435250c2b1075
Pseudo Output
d25f24a165b93c09b97e6ab4f8bb1fd44485d2606c84e590f313bbf361a88e5d
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
7a640541fdb9d64678115a84b7b02946aca74763bda9e9da3362d8a769b68b39
Commitment
8e70c14b7d4e3fa3fdbfe3cdb40b16efe0a38569e866c20feafc306cae958f07
Range Proof
672 bytes (Bulletproof)
Memo
11b00baca7a52ed502be91396abc138817f75e0cf3f5994cfa426f0655207ccf4620a5da80208c188c9ffaf77b89f49d545115d33d8b680c313fe0f366142ada1d8a8086b1696a25d79feee206d31e0379dc52987a9f4cad825de303487dab1c887c1d03a6e7d8dc220f588e86cc03995518363f227de149bf20c8092ca91124 (encrypted)
Stealth Address
6eca50edc1ea0bd4afc6a7b62382095740da35909bb9f174e8db4b75d5794c04
Commitment
485a63c178baa59483bc61104c02939b1c4775e7455439bf7cc84a9495428909
Range Proof
672 bytes (Bulletproof)
Memo
42aaa4e22957c85f89b198dec1040240d77c84f04f5673f4ddfe432159e20dd3b9cf231d77de7d0a501aac39584829a79893828c7b9944d52098f71eb19c83ebbe1c39902a466dc88dd208fa09f58873f2854fbc7236240bb58272adda8fd234fd8a4210c44812f514b860b53544a53889721bd8c487e5e6c9397facfcb32fb8 (encrypted)
Stealth Address
8aefd0555e04d335fee2f928b0eb772875b0eb1dd7260d6256461380880afa01
Commitment
c6145ec376a9b61f39ccf935fb29c9cf37f8001e1bf2e8163c007176b0ec3b52
Range Proof
672 bytes (Bulletproof)
Memo
9943bd32d3603869a515ca36d312a6250e13587ade20e4d4dc0e03af5476ad6fa5225bc87f0c53928e3e1a66a3e5ee575ed505648e28a8531140c55f1643b9a94c805c30eae6854f4108ce16eb45768e8cc1608ce6fd81c2b76108086b872cfa736610fca3c0cab5acf7cdfcabc64e96e010003fe0f1f97b4c59d441d4d77469 (encrypted)