# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
42fe44d6f1c4cf67452e80514185695b3494b88465d5510f9f1e6286697e8679
Pseudo Output
84fbe7479ef5cb6fc0937f55b60e94806b0cf19a95dc6abfc976f07d3f7c0e25
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
7cd69f02f8e107f5d580121289ec63f3be0a6f7c44654cd3672431273fe73963
Commitment
00a35f43286358c6bae3b66894eca85fba9cced68f9a572abfe3d757ab5cfe19
Range Proof
672 bytes (Bulletproof)
Memo
598f359acd0963d2423c8c1e4ddd7893380bb6659c16654a199cc4f4d49e7a62fbc06a15e1fd41186281c037c6c1fccfa12e8b6baa3dcfc278aa0fc90392bcebb60b21aca73149645068149c24cd5ac36a0e76c97fab3e4d57d51d2e021aba75f8e34d042b97660670285470bfac749188cea0d19326f6861b505c972243d819 (encrypted)
Stealth Address
98b90e74a496fbb69e18a3361acc9e7277c14998ffb28f4bebd6e01c6791dd6d
Commitment
9e5c3dc9103a6e3d9607bc370e3da19251bc0b381b403cd07ebe3811b9e8e700
Range Proof
672 bytes (Bulletproof)
Memo
5dfd51cdf78e8776a697bf4915656eea30e7588c2a9ba5a4650fbc9dfd31d82b24ac07ec9be74eee72f89e450438324fc0194afc95e26582119799e0e2655d9f9e50271b47161ab4eb022c5fbba88e01ea65b14cbeac0575409f26b999be79dae243a04e8fc82d37574598708aab357fd414d301bf2bbd777d58705fb4528c4a (encrypted)
Stealth Address
f0e2534871b296b8417f94a342b262dcebea542ced129fd682ec64eebaaaea6a
Commitment
1ae46c1b7cb2b91cf1c7ca4e8b9b0380532a948502b6d1347d48558fc0fa2912
Range Proof
672 bytes (Bulletproof)
Memo
162a4910973f548c8c37828a7ebe11f53714d3421a305508ddbfce564a1530172b1837ec50435626956ce6943efcb9a6f22c05c5bd78ced506e6bd9488eb96073e3205883c04506d12d1d37c644978c5edd1802757198d56e0e9a5cbcb0dfeb31903069578b42dfb7c45150f1e1fbf3329465dd4266827bf20e19ff4049e65f6 (encrypted)