# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
42d3096dd3ae44424929ee18050b39e9edf052c7df11f6166aff8f0a4c767778
Pseudo Output
e01996a56e07d605f40bf52f62ac88ae8fb731046806c67efc70b39320ddc16f
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
94e2a96577c83d3523a42267842b7877102df4e4df4eda007528b2b90b2fa52c
Commitment
f22570f346d788dc3666957269999ce5f85976a63c36af5116f907c248537d43
Range Proof
672 bytes (Bulletproof)
Memo
e0b478c0796c1ee4cc79549549f5c40ef1356127023b583dce5c238053f35d85da9dd7b480b8ab82b1c38a66e0f5238e69bd31bb23e076ef455c5774611dd2e2606d2da84bdd86ad407ebc167daa9020f43efb3e27203b5baa070bc0a9a28b1bf1c521dd8b69c3dd6afba603ed217ccb9f02924efbe15c8c501bfb1b47405223 (encrypted)
Stealth Address
c416a801750ed7b11f74a0ec4365488fc372412765e6d4f94cf95b7f1bf12e13
Commitment
5ad3ed3de9d0e05d62913e1971a149fe97df549a44a4a123682d5015f5f50f26
Range Proof
672 bytes (Bulletproof)
Memo
02fa274472ba0acfebfc8d58d708839c60f85ccbf1b0843b2e7e6024829f102886903dffe97ffbe09be93a15cf889387a08fb0c8b8501085eb735b118171344e2c184a2b87a3b66876a201c53cba4890977e9338e6a0f29311f7a43e422c0f5b5fb0f870703f0ebd558f5f0f142d6f77654cf7adfb8277870cf214763be062ed (encrypted)
Stealth Address
68022f774a40f776e927e8b2e143a5f289d77e815279209f66f823d53c147f32
Commitment
c488aed6629d257e72f69b610ac668463c5f2bff80c883a1aeb873b727a08622
Range Proof
672 bytes (Bulletproof)
Memo
3d3390b61053d803d395b009f0017ff9f4b7bedc8ecf744915610b015c3817cd6908608847be13cfdddd46f8c2afb14fb46aa25fe668b659602a59ed3deb703ee26093459f3ad84aab192bf651ceafd72f7bdfde7aa97ac52159e81d4dabf90bd55d1fb335efe6c9ef9feccf1291eb168e55bc1036a86bed40703985e207c5f4 (encrypted)