# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
8855190e78b551fba3389c9483647e85b92c15c3f76222e82ad8780c5771a260
Pseudo Output
2aacebbb6d80634e3676df39aeca858706f82a8997d68a683d8848d8132e6719
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
7072f5ff531f1ed96188090fb04bd343f15dbf1facfc94577025f96c4159c257
Commitment
984a2dd7605674cf70ce8048025031e7e5fc3c08bb06acf3346581efb23c9418
Range Proof
672 bytes (Bulletproof)
Memo
c4dacc01fc1f057a3c0bd3123e5dfcc5b9a3b4b86e6bda88ce5a29d9f857ab553a1ee007525dd5692c1880f03cf459e7326c9e339808b1cf5a071a11a16f43c1ca69980c9dd10cb3be62517741e0934a2e599e31cc7a81c767931093bc87170e5c17d04526f117d1d9787680a4417d4429701972d1952380e2e37a0b2fe5188e (encrypted)
Stealth Address
ee8fe4f42fd3dc5e82057119ed23942fb97234f460664a6c9f0c7a518fd7402f
Commitment
10894b565b9a26b5db401c03aba929df502ee69df910b895a362c924a5c42367
Range Proof
672 bytes (Bulletproof)
Memo
88e802c8a496de0f0bcac6595d26dd8aa5db5278edf5058717a942fdc274602926a21a052e291d126ff1f43b61a7269f25fdc8ea85647b35493b10cc88d71653e762bdab4ccf222bb9dd2c6588b1c8df094624bc2a26bf245abae8d5656962789a4e98bbeaa9e2395048ee61b67c8c82e4a375551ba199b3c7e305cb024a23a6 (encrypted)
Stealth Address
98d777b2af3b3107563434e9e4475ebeaa65d8efb1ed6b77f0299c140272220a
Commitment
fae540689bf57c7a75ec1823cbf61b4a9a7cf722e8fa5b88f7b815ccf147fc22
Range Proof
672 bytes (Bulletproof)
Memo
6f58969c0277857424771a0d75df967e60a763d11c7783faba9e89dd4d460098784e6ef974f12eb1e32594a536a849d6d922efee807c4c37820810ad04188c0f4ac154849fc6b9a55ab850ce5ccf78f68473652afa48a23e256129642bebf897758fda70323a34d6dd745940b497fe74b9ace7b2197239e2d3455cc4410d5587 (encrypted)