# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
9cf734979cb68a9359f918d439c9455c40c3edff6fe13c4c9364244689c4083a
Pseudo Output
1e9c6d78c845675a8534714d2ef216c57ae970a1efea5f76ee11439a1d99b42d
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
5011f344195c207fae77f50a09d6a67bea82b764344fccf710e2891dbea0454f
Commitment
1c736ee7130bf45e44ec3dc42c5df993fd9a9db1c1ff9b2c7615b54ba4a4a97b
Range Proof
672 bytes (Bulletproof)
Memo
109ccf099ce9803254892df0bab58bce78c6808304d17de674f6f677a86e630e306a6c1b96158b55dcc06aa8c2e34ed73ebe6f14f4d9483e7d7b5b779917693141e469b9c6a0fb6f9332d32e026bb3736a432b72093505132c6c3436bfef9d693f9be9d01c4457c584778067fc03c42de4c13fce446828958cc080595a6a4120 (encrypted)
Stealth Address
b8d0ddf325011d5cd0888990f2351b49984a735a7bc738b300eab7662fa04f47
Commitment
f6d309946395e52d82790f3b92c212d94603ad8d449cd92e92b4661ee0db8c32
Range Proof
672 bytes (Bulletproof)
Memo
d3e2bf9b4e6dc6eaaf928842e3c5f54c8cf9978391c1ae1e6206109703ce952ba16b0d68d3a6b74d289955652ec371a50f2493cc49324fd5d1641873d21ff0635810d4f081dc63fb600fbcf6312325ae507552dee35c30a19b6eece3c4ad5bcdd02e8300594922fe7488f8d61f52003992d3ae012cfc26f403f82e1a1524d8c4 (encrypted)
Stealth Address
dc99aefd14ad511a91fa57c950c184add31a9003879b5ba3ef365d217b85344a
Commitment
7834484aae791415f1699a669e9f8131fed0a55f8db800c353017a2abdbad163
Range Proof
672 bytes (Bulletproof)
Memo
eb1d75dcc59da0d6940e0359ecfd65c8643c6589129b892ce07aa0880d0e47d956e051d51faa8f6d0b0b25112e9e6eff1c646125fc217708bfef71ed76fe12e22e4d9e53d1a96962818af60ed224171e836a0a1ce3021afeed0714c751b76c5edaa337d4d0afefe5c83656db0113cd48809a58cc468d34e1f4690db2690026b9 (encrypted)