# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
10a983f99f7a4ad8a6d82f5928654223f9cf2d9fc4018f7f137f561b22c58841
Pseudo Output
f863c33dcf6674417afa7891c9c0fc1a01cb9cdfcfd1a3abc2f2b71351631d12
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
da22875b8e79c3688d12805c6b731629957801c2cb7a66fa2d22313e703dbc13
Commitment
c80f0867860f819c0e49604c22165e28f81984494dd54914ea2ed0ce8067576f
Range Proof
672 bytes (Bulletproof)
Memo
666ff82b598e24ebcb764f919fff8480e26b3ba89ca78379550ba5194932411609e89df4819bd94113a89ca187e151fe0d65f40d8d87848d8da346057aa5d117fe5575d5ac5fbce7854bd182d75da3dbb1de952a7a83b23c562950b843530738bbaa345ceaa8309063710fd0a685c8f53b21ac2463ae39430a4d7589fc284769 (encrypted)
Stealth Address
84e35e40efd6122b7a11f6f313539ad7e58c7dcf33a1fcff1da05ff7f602de76
Commitment
d8992e877e631ddab12160a2fc9a6ce8425cc4f4937f4978e47c1d9dd6df5f55
Range Proof
672 bytes (Bulletproof)
Memo
cc578fd80166e56457e75c941bd75eeb708bff4ec79bacd213f94feac6c1fa1809eacb5db7d1c5cbc35150cf17a5476ca36d2583ad5fc432fab02f4949badd2e92051a7e90e85705d984ca715897dee08a67420d26ca2fdad5f4ae2b18ff167a7d380fb0906f2869db5ae04e2e0af890fc1529bf06ebf49df178002e8d92b7e8 (encrypted)
Stealth Address
76627a4534c0498aad87523f1ab5a1f6b654b385e7435590a0ce747a9d946276
Commitment
64a29d91cd50a8efdf21144a322201db68c44f9336078b2bda98b9ca54a2ac62
Range Proof
672 bytes (Bulletproof)
Memo
2fa236aca1e8941359a6aac306b5b798665e6555aee49140aee4df4e909935efbef272a0eb83f8f1e033f9c2ef9937afc114837c73eda6e6411425f4115d9699580f71742b66c706509a4d4b2bdbed896dec375c8750c319790e14a8b0ae58510455df62a03503d2e2007390ee89a00f956fe2956f4d4da054b451206ebfaec7 (encrypted)