# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
a437c9f277fb8f77829303450360a1a4c44a925278a888a3f610fe618ae5ef63
Pseudo Output
4cf107db13ac57a300dfb0d8e6999f29f6551bcbbc1d55f1fe23b65ab9095d19
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
5a59be85fbd49c77f8a06fe96ff6cd41a81433320a272c5bf5442f2aba7cdb41
Commitment
7ece69707c83fe23e253f036fd8ea4ee6447ce2a7331864f8e9155ed10ebdc58
Range Proof
672 bytes (Bulletproof)
Memo
70cd3600ff5696d4ac5726463ee35936db0260a3fa56184013dd9a8d5fb415fd4bad9985ef9693abe6579f8ca4f1a83028ea4b9e67efaaa5590581d1caa84e328e3a250168f417ff0f4c78d497a0bbc338679c5a4f8bf9baabd315a0ce967de146ae843f560143d9846e765f31ad15f3c1ddd5a91c03239e19a0776f696203ca (encrypted)
Stealth Address
be45ddd9bd97242bc0e155a385f678377d8391c976264570f3caaf755c490546
Commitment
84a0f733faf5d3497273c0b1aee2252780cb99b11cc6c61ea5574a9263475d18
Range Proof
672 bytes (Bulletproof)
Memo
1e6e5acabe4b17e3ec4344f40bc7dcd7732bf087e9ee2ed047e4d689561c9fdceddd9025b5f87baaf996bd592fbabf910458a151833add98a3d2ecbf1c024343e1c3fdfed8cf0457b289b8d9d0ad67195efd473d65e07c1a49f480384fb6c85a94c89b501200187a152fc880f39346684e219dfad2ffe3a7ee26c1f8de25266d (encrypted)
Stealth Address
ac9330375e5baa933609bd391976e089b6300793f09d43a9bad327221a803473
Commitment
f03c652f513ed4e2a79822eca91c4bfe13b1717532e70e40a81d5d6926d0287b
Range Proof
672 bytes (Bulletproof)
Memo
d9ded2439c9ed34c9c1f1b5eb2cfca2426ee652496b823a8233e16ba8907e13d7001cabc1559ec35c02f7539181a55c0d1c320c4bb6a5c1729470d9238aecdd389ac633c52f953bfda0365196abe40baca36c2b26558d83803ce0fbc8d04fce5a101b068660e4cd08cb56dba2e7ea9b48ab23a2f67779c8f9ea7ad91a0bf0316 (encrypted)