# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
90b0066d00dfa85dde6d9c6a1d73317187c380fddfc2aa0854d06e23d306eb6f
Pseudo Output
d69dceb5989c681ca9e96c34405e6cf590b1a820da8a6696cf90f73739cfa80f
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
ea0c173796d2d87f34c70eb17a5cf41e53f83826575f9ac17005b6e14dec5d50
Commitment
4c849105150c55fded5ff43e733f7d0d9db8b875ded3b4b43cdb3edcbdc54254
Range Proof
672 bytes (Bulletproof)
Memo
c49756c4f34ffbc9a78357f524a8e75b61f838b862629d67c557d3311c6466744a5e1de91e72ed9e0d4700d00b9e425a61e23246d1775d8770610fdbaae0e37892a04de56f40b31e0a2581556e61187d26d68af8e095d4d7714b8ea22aebe1cd8c5d786c92c073c6a2d60d660db54990d243a0b56f5b79813114d53c934bb0ad (encrypted)
Stealth Address
9e5ca9702856857ea54ac6a3c8f24b6e749f96ba895b2239c21fceda70512a4a
Commitment
dc8608ab6eeb664dbb9d635ebfdc6a14a84826b80a11d0af40c440263c39b151
Range Proof
672 bytes (Bulletproof)
Memo
172d51645ce512d5f11b9f0c6d2b95e936b2024207b200729e0a6bee4b0cf9b5731531159f2e1936e10806fd2f4dfc62c2f0bd5d72d714e794e6841b269b23c0baba072dc6df091ce7ca912713def3ee1dfb583c65b765870568f73825252daccd56cceedc695e22920cb34f2a20aab152c0a57c0b25c907e068a61a28ff3c5d (encrypted)
Stealth Address
9e2794223c3e100d98b61b36a25ebfc9437ad83ad6448ba96ae4e997d7c94e35
Commitment
7238fe17a97036ef964d8829b12e0464b03a2c1efeedd6b3af0d9282e4067b4f
Range Proof
672 bytes (Bulletproof)
Memo
2741c27cc459ff309e74eca9d3b72373b56c514ede5541d0ffd9f7bc3180b752ee286722617ca299d320abb4937e322d329392e7a3c043b8b7685dc3c14edd810f72ce4753e39dae31bf7ca2707540969374d08486d22c3a7d423dc5564447e4ba14d32295b65789633a0842f9205a66afa351cd73a1ba6455e624bfd5046032 (encrypted)