# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
28407134942a5fe4c84ee0b4a5c0de7fa03c65bdfe0901df8730bdd3254de855
Pseudo Output
68ac93df083a1c4ea3f9426300c095ed1364d5eeb7519249305d8c218beee31f
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
866a0c32ed7f07a00930af2c5e1c9a894d619ec94c0a2d24145154f9a49c8210
Commitment
2c7dfaff24632a68a093899c036f5af6d44a349e35a2a943db1e411de3e9a338
Range Proof
672 bytes (Bulletproof)
Memo
74574e81c6211230a6193e61274059495b1d8b7d437d422b782206221edfe06a8c10e2fa1153f2835744bbb8e669ed6b7fbded60917ece6b392f85c42ba73cbba9b1e402090b0f966460e237d4a07109bc8a1ff757e40e0d3e914a3f48d1a5726a339d194d9608638eea76d584d631f878290fcfdf27053c59f0a5cd670604f7 (encrypted)
Stealth Address
9eb1de14f023d007c015a360539d08f9b4d5a376253dd2d96166689e6c920a58
Commitment
1afde1436ca198199edaf6ad10b2c261fede276a8cafdd3b352b0eb59991e50f
Range Proof
672 bytes (Bulletproof)
Memo
183689625554d4fde74cba135e5d6b1d4fb5e9484f36ca0662dc683cfec6ce9287f33976832f073d8361566229698996f15791c83f3877d52caf2bb7aea865981fc0998b2cb73113dbd31c754f17affbefeb85e37fa807c484b14e9ca79c762a0a30a82dc27b3b1172f7449a28ca9571e61712ca182d69c364e3567bc59fdd0a (encrypted)
Stealth Address
3a54283216a6606545151113ed3a5ed07bb0a76b3b99c3a4633b96e1abee263e
Commitment
2a469f3dc1625ecfeef0c8967ddb7a00fe2917092a4e91c384dda6dacfe0994b
Range Proof
672 bytes (Bulletproof)
Memo
83a36cf1d5252fbac67ee37b51fe700745348f767afb482c60d735277c6587608d3389e7e4cd008ac16af254bc3288d0b5e86fcf5ad8abefa5c8fbcac35994443c1b21bac599121c2dc0ddf85c323a36200791c6cceaddb31b23900c2b227f3152acf4e39f1f309022b494cf442afb1c6b5918d37d62d6eb65f7e412134c3ef2 (encrypted)