# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
a0072b3c7dbfaeb71708df4faa772b4ef8bf53c51adb41baa92dbc60d72a7244
Pseudo Output
5cd437f11766a588cc2af43826b8e0ea0989074fb8674dce16e42d3bb5fc9250
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
2e9f7ffd26e37965a2f033c10399cb8997c8332f6286fcbd552ad06e9ffd914d
Commitment
224f1cd1cd457d9d530ca0fc8d2d2a16694c2d5edf7fb34b6afcf433355b2c64
Range Proof
672 bytes (Bulletproof)
Memo
a23f96f07307588290854b424e1c6f3abc6df2472a39e3d13b85da31ea1ac093bb582de5116776193ae711188b79a50576d2e99753d297cb53940f49ad2abf6af989eed754591a0ca6d3d557db7d9ab801e1e88418cabbcfdac2a9141330a8417fea0f21f3ea7dd9fa46f36374f7b529eaaef323611da1dd729f1143889b4807 (encrypted)
Stealth Address
18c0f08cd2b715e428d2826519d74f4a3bb6138ded67edcabcee6aafe6b3c451
Commitment
fcceb95554b75013b2dc7a5c34a1175db8b1b2ba58d90481b2c238efe31fbd11
Range Proof
672 bytes (Bulletproof)
Memo
30c944a7337a961f20ccc4fbd0952b9f7f96744d89c8f4c6af836ccbfcb16f97daf55a3ff3a2b2c7a1335dbecb7708d0303a06c8f7f24c15b4ed13eeb416a2a96f473eebbbe72572b06a9055f0f6d60a4ba19b139f7b00a9f60130f3be5ba67e1a229f405e1725c606c073578d1084ced68229a51e232217730c1aeff9223ccf (encrypted)
Stealth Address
083b80b3c0cac7066ca9ac3e3c70061a0deeba38ec069ad1c87e0c696b8b9f15
Commitment
fa9933381d65e6edca1fd47125713615f4a91eb913b3b2d6a10aa797cc56bb1e
Range Proof
672 bytes (Bulletproof)
Memo
a4040c5bec482503586404b754520ce04bd53f96893228f784fc2976afc7398578bd3a900fccb2f3171ce8a88890b5fc5c854a89c296cf26343afc6093517ea78caec2bbca70596a330b284d735df4a93f6ad1bcf62d7c28e1d75d92ec172aee41a6946eebe2a1432a1a13dc543d293af18bf8dd1a16dd725805bb92f91983f5 (encrypted)