# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
e2aed8bcadfd1a1f5185a0447fa76534d253daa9b231d1fe0344438f6f9c9925
Pseudo Output
80876b64dbadbdb53e22358fadb95343818d5d3832f104c4cfd736fd9a5f1c7f
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
f62e07bfd3f0b0d53da3bb2fcdb45ee7ab625376ed7702cd5d94a91dab740e4a
Commitment
ca48290bbb81afdaf93247e9123de9507763da6bc654293c9354efd834fa456c
Range Proof
672 bytes (Bulletproof)
Memo
9cdfbb4c0cb79b1bfbb05803b464f366ef7e1f9e6a993aa14677281b3a57dd38d1589f0c5d33a3579a5560e1690c445513016cb6c44917eaaee83cf2ccd96001c2bcb740bd579e5f9984415caf2fb2faa4156d758f182007df59ef6b704d678d1fc1a4a6995ab7803cd4518b57762c8430c11ed36b06c01f8e999ef402595401 (encrypted)
Stealth Address
683a74de7cd25227a81bb0305334801836195fa83561d7b8abf2f7dc5c867d23
Commitment
de151e5affd8858aed6520d4d42f5027a9224aa2f6447066d72a19094d227920
Range Proof
672 bytes (Bulletproof)
Memo
3aebb8c6c9c2e0a367fd4b86818baa49fba3651ddbb816b3429d61c8eb239af0283604675217443989aee7ac59ea58ad572a674e4461dd75e4864552545a87e017f5d2bbe46818e4dbb4d3f341555e34df796862365923e7a0c87a08b5459325cc7b1625684e4095389172c25a6f31fef6034187e0e4e106867147b790a5b8ff (encrypted)
Stealth Address
a8c18034ff77db050058f328674e14c740ca5885e2efcedec36d28d31440ce44
Commitment
662a6de708f23b058a84a810174f1cbc42d188f76dc32b1476819346e3f94724
Range Proof
672 bytes (Bulletproof)
Memo
16a966b131230bfbe85fd9eac7ea72b9f7ad2d878a9e2e25252f309b47579ea6e65842e8fed96d4c2c5dbd41631d1ef6248a58abef4c051efef3b28b084d9f56320bd19e4c48d47885f310858d41730b418b5995bd48b83f3044e4ec47c020ccc5597983d6025bef088fdac6e4d01eeca412fc650b25dbfa31bb562a8d4b522a (encrypted)