# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
fef93f541aa2a84e92895416a00302b93dc23da16306f70dc7fa29aded6fca5a
Pseudo Output
58a9928700163fdb347c362b65c69c87e3ba21404cfbf88cb48a1c3ef3b70159
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
760d92179d61ebdbb2d7c765f00922fbb04a5a5eba799af0bc8e3d21bc188e0b
Commitment
0aa3416c93b18286b2e6cfd43c4f89a6434ab5c2954b6f0d7422a5642a537d78
Range Proof
672 bytes (Bulletproof)
Memo
de32b9aff3c791b0f653dc469b0008212737816e3db442f97ad0e92e67430e7294e75f06d8d129178619da562515ea1ee6afc3486ee2f02e1fefd7315ff803011a9c7b5663a52d47f9500a763a53c991de19f660e10b87847ca985398fa08657ac83d4948328193cfd80f5454bc1053225778ebff529490772a06724a3324b8c (encrypted)
Stealth Address
e06b963be43b3d1aa0f20edbbaa5eb1eedbc80eb1cd93f7ed864bcf83ef4275b
Commitment
88630015a397f1e0a67b1b593f15d2841b8489d2ac36ba5f6c1ede224eaba67c
Range Proof
672 bytes (Bulletproof)
Memo
729571567731be65176c84f8d82dce688dc56c5ff3779df6b625470b0e15da003fd3641334897c5656f545f552f2286cf4b12f8e188d0795a12916c123a3bf5bce5d98a5f9a564b060ef95c027648bde7ffbf9b8b7e62109118eafff234116d8ef6d424859aea4cfe8c8040e122b8301d459dc57785fb121691538ee6815ad4b (encrypted)
Stealth Address
e869360b93ce61b4db2b2fd284ef3457592b7a3c2c9edad0b790224a89baf022
Commitment
466d7132f18c9d859e04f67fe08baea3d9cbb8a04b0524f61b059f4103e9b341
Range Proof
672 bytes (Bulletproof)
Memo
a671d9f1923b5f2436a3bb76f17db7d6bfd291bb9855e9c93314bfc34e6cef0ea6cd439f8542eef4f355518841573566c7d284c5aa431f1df8167ee7f17882a7293dd683f847e2516a16abd991da4af907e4e90b28e0b17de3a6e60f2549b5d1af64745b016433d7cefdf07ee2eb704b47d481059b5a18346f84344240e118b2 (encrypted)