# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
c897c0248665e859774e7195fc53716959186a3092e32229d91af7939b3bcb52
Pseudo Output
700a90ac7b091650c8f5b4e4885398edb22f497d8875ea0463f76c5cc4ad4944
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
8e9750b674812cd10e02331e81a4119684a429a9e7117835b2f6eb370105de02
Commitment
4a114a878e6b66bde9c631f916274a824faaba372431f8938441659be18b8521
Range Proof
672 bytes (Bulletproof)
Memo
ea14e6d3bd41bbdcffa31022ac796544c405b3f3423f0d409c1d9ac72d515df3288b19f743f78a333b5410893b0a549f16d82c9fbedc77c81552d7dcc22e872761a3909dd4ab3c5972a385307ef0c1dec8661dfa055ac349c2fb6a0fe9f806bec79d0451d820cdf502b3f082e73927d2b926bced612ac7c553d100178fe5fd7a (encrypted)
Stealth Address
84255b93b04fed4d0a227cdee57a6ed3d3538cf7b693736b6c3fba7077e91f68
Commitment
70110c4d4a300bdfc9ca4089dc3e353dde46f675a7de1a9c74646403131c4e7a
Range Proof
672 bytes (Bulletproof)
Memo
4b49cd319133876c3e9b82d9633cf89c1d7569f1e1808389554517ae0b341ea6a12e6f1ba68642cb890dce88d3e3d04701c0b41d5f00d4cb9396a33d3cccd0185e5eabda0be43a5e462a1e2f641649376c0f3ad9179538a1f4384e17957a702b662b0f019094e26cf246b2c9bb6b553f76159d017c3e70f9a689abc3d96b33ae (encrypted)
Stealth Address
f4455c876c0ee283d7a8807f5db3d80203d67b9f7a490ec7f1a582a6c231dd47
Commitment
b4d3f1bf18044cedacb2532d22357ee27f1b4b3ab6819db83a7a229ab8b70006
Range Proof
672 bytes (Bulletproof)
Memo
82ebb7296c4c08afae200d2ab9d71622987c9c983418f5a02a82618297bf6896f5efb13fd2f2a2c7320f598364ebbdc33e19b50e4a5563545f9f9fa723e6971d3db0f277c950de4575968a07ec8a019c785ea30fc3f2ece2c62507b6cb24150504f47ccc46386169a6b7ff462842ce1ff27e92f594ccddae6ad224bf4ed0c961 (encrypted)