# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
d0f319c4ab5c8e2d0ff5dc8dbb42ae877b216afbf8af351af9495998a3b17261
Pseudo Output
1ae3fb37e3152b57e339623d465cdaba8f5f52c69e2ecc998123aa7deb30ba2f
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
9898a04dd137abebb1389e1eef728ddbde1de92c907695411e8d63b385a01530
Commitment
e8a11aae3d6be21584952c913f3974c723be16605a3233a38ea405c27b44ce21
Range Proof
672 bytes (Bulletproof)
Memo
44f4bcab0a724a0f61e5a2ea3527069e766c1441a83593e58f2af76b46fd803595143653a6fbc2ef2d74befd248b014712f93dcaa8aa6429d108e11e338caec8fd9910f193f59070668a99dff63727ff3853960c22bc4b0232a397ef7bb7eb91a2a7ca92452f1f6bc0e48be5a5f1fdd9e81e40776eee5ebdb556a5238a88e70a (encrypted)
Stealth Address
b86dacbdff043e8bdbf584a16a76c86fbdb0d07159e8b0c17a018f1f300a7438
Commitment
803e2560296885302b01fa7a8365a5932be1c84d01776d7625702bfb7b987367
Range Proof
672 bytes (Bulletproof)
Memo
ccdf29281f205517f71585bb68f3d4699138a2e4facd25977c3c59ab03aa9aa5289f173565e7cad4cef95b83d55e28931bd6b346b7deeeb4521b17fa66f27789b7aaaee967c687216d8e0cf7277fe312f80ca3f0479f4458c18b1ef1628423ae51d61e0b680670bf788fe7230aa1cb75eaa203989dc7350e523a409c853fe550 (encrypted)
Stealth Address
3080cf430d279089d657c8a1cb7ab814ee861ab137eeb8dfe8315a7da6c5720d
Commitment
0662b2e84f479a5e37d4ec2ec3b1ba9a1328b2a7fe54d643b724647f53965000
Range Proof
672 bytes (Bulletproof)
Memo
a1eac305069b94b39f4ca8e0dbf2febdc09c9e480b484752d74d75c3f5489e07e329faa7908467dcfdb0ddc9d8a7dcbc59b9ff639651312bd766386fa4af892966e299a24a178e8af0c91976f4fdb72302ac286ac8ec0577e173e12cabf90502c80cfb9db5518f10bd81472e50a47705598c13b277267fae88b6868a28f7353a (encrypted)