# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
feda146ca815818fee8800d599d25e296ccacbc04a7564fbc7cd364ca3e23446
Pseudo Output
00397e520d8359c01f295efa477401ca0cc856269070b0b56e871d184adfc436
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
74aea1fa00ba305b6202f4de62751ccd86f7738048953994ed5e83ad0326496e
Commitment
a009276694d877db9b84f99a701ea38bafcbd45cadf4a0a2738de78b9a4ba706
Range Proof
672 bytes (Bulletproof)
Memo
fb3eccda4b6788ce6c43ac8e78d55159dd440b827d2517093052e0196056a75030dbaaad154d94ec381e35fbc4d07f0709ebd69ab2294d5a3312a074b37049421a6fbc271256be41a4a315eab64110f48a1ede465f4ed35fb97f8c153afbf604ad45f39e6ed2edd1760a5d549d6771063f08853a826bf60e2dd192b42215b94c (encrypted)
Stealth Address
2a1dde2d4a31b92aa5560faded389db6c48679251b96613ffe51de504d7bdc76
Commitment
30077a610a235fc3900492b0096f77e9119ec544d961eacd7a2ad01729150f76
Range Proof
672 bytes (Bulletproof)
Memo
47a8c1eb4fa37938eff7fc43825e9573d53bf1c9c90bd4ee5e796e2cd12216db94543ad41c896558af8bb4c5720ca29e43996bee381d2f0aed7a541943843e642d0add4f9ce3789496ec3ed967ac719792bbef7c5391774ca7bf81c7a6a51b6ca16b2366332b88de866ce4b240a8cb42099d0c45881c67e8de66e6f2153f2780 (encrypted)
Stealth Address
222d9a57f79d25c0b379cfcd61c94529fb6b5e870c768be67b021cd331c73822
Commitment
648618cfa4facfecdaca94fa519b43f79bf6ba37e8906133c26419743e14165e
Range Proof
672 bytes (Bulletproof)
Memo
7da83a778d12ded74f84a48cd45c7b3230b754720a8b59a00c76f6a873c7b34cd19925a43e107e17eb48f9d9470da68fcef1894084270f2145c42c975982a4b5852ca6db6a667c76acaa41a8f6bc75766bbf2e5be28d49b28ac14ffc4d76cb8773f0cac7296ac0fec0f0ccb0911ff771957f7c9dff9969ade23dd1bb6be3a553 (encrypted)