# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
8ac1c676845b316c3e5aad248434350e3f1763f5559046f7b4ffb7156592b204
Pseudo Output
fa2b886281b2f4ec3cc6b8605a010562a8acc5fadaf05a851f45b7daf1e1a23a
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
b44bb91bc8c8e49b835be007d4abe3baa75f21cfe3d54000be2ff8ec2a20d01d
Commitment
746ef26bf1141d392560e1ebaf778d826463c7c9683829ba0a2e020d41bfb148
Range Proof
672 bytes (Bulletproof)
Memo
7c8741cece2d24750e478d9a2c0dc2763344a12bcd86feedb35c66261dfeae05a312f9c89b5644a5e93cf45ddee6c8462f24c860a854fbdb38833bc34100d4da6f9d1e7543bce8d4759689e9284ebe6c25f9609cea23a8f2c0f93a4728e6b12866cb6ef75672de6b4f11cae1c62ac97c1eeddede6aa649bd0b870cfc505b48e8 (encrypted)
Stealth Address
72ca457de0ea9ab8a05497e1a8958af3e1203eeb1eb7d607d689311335681a6d
Commitment
fc402c958fce4658ba02445bcc5669808815b87ecb36f2f4a3e7e9c19946ad19
Range Proof
672 bytes (Bulletproof)
Memo
9d18c922d49c245acea1757ad11b002f284900d573cc9f55e23385784c70b0efd012be6210fd30ee9f44cb054f84d1a65f85630c9e49c5cd5f6538fbdc5f25697d69f854679cdc1cd720cfb33ec13d2986d8b62ec5e3e507bef44b719247bf8b9a8004d2eaa6c4b009fe09fde0c645e3a77102c8fef343d40060109587881105 (encrypted)
Stealth Address
e88fdf8c1b19b245b5760c6b04192a6dd2814fb82098eda8d1fc0a36a63f8910
Commitment
7ec904c7c9eabaf8ba670c481a5d3bbe384f31274109352ca29b0861d91fea45
Range Proof
672 bytes (Bulletproof)
Memo
4663b9128eda22e31f124153a9eda85c3e868969faba9c4dff1db3129bda548a89d135dec1b7e3065f1b0c9f9dbbf36583eb3b710c85bcd787efeb4938b1b6e2e3df3dde9a9f5dc409d8d8c4108f55ac2375c700f088576fcf84449357734dc57c84ff3aecfab0fbe1745d36751eee2af56f9b7c15858c1b5d6ad59692cb1307 (encrypted)