# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
32d45981ad548e2847141191f7d7e80402b43ccb3fb349e9c53051210bbad058
Pseudo Output
da71a70cdc0be1c6db3008789cac8d1881439f3425e582776053bbb9afae6074
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
5e43b79b90ef6713f101527538fbe8646800fce556800b575c0b2e487c677e13
Commitment
48a9b9f39c27f6c16f3b18d9692876cb5d25a17e9e58a30a78dd45ae923e6f0d
Range Proof
672 bytes (Bulletproof)
Memo
808cf4d274ec5684c2827e4cd931d8a60f6898aba740cc2740fafce12b963d3fd087eedc6a0a3e319f95b85ca19d1f23938e41ca20ea73f2e8c38b07c60d3844f0ddff994bee419b3bb577059a6dbf895a459066788fa022418517bf141ceb97030b238c2290cd4ea7890b236c783653d954fbaa9fe2983a3285f60f3b0ca4d9 (encrypted)
Stealth Address
2e4ca7e3cd9973379ef399c4dfe258b7b60c00a3416da263ca7cc9f782a1013b
Commitment
ac7987519f8463cccd602e560a8afb26524915c6d0c012962afa3ba101aa9d63
Range Proof
672 bytes (Bulletproof)
Memo
eb34f7cc9f095069cba73812f0c96a3bf65d00194def3aa28a409da016b0407c219a70550c7c9b23bf24a7a2d03067ce9aec5c6ec2dc7ebc6f798af8cd40eeebe47f85eeed95d5ea4d85b95b913717310ed035cd11fcaa3b4dfad8056a898ead6c9091cccace0d104d2ba856f89318084f6f10b8102f66d9c73834acd0b394ab (encrypted)
Stealth Address
069a7b381bfda93b1aa57870ba1d6befd916f06ee2455c4eb0b13aea50e6a262
Commitment
9871ea29455349ad9d42faa1585ad89bf12533439d238e7c278db1da5e70e87c
Range Proof
672 bytes (Bulletproof)
Memo
17d395029c4c2131d898f502170d215be1d4526fcda9d671328008e1cc68288fe25663e819dd2eb6586d47013db5a21a0769e3eee8a6fe20d00463310ac05e7d7c2cd9435b44b665d963219720955b811fad04025bde7a4aab2ba79420ae60a813c7689cf0db100b9062094b341484e90c842992e42cc2f21ff465370e7f1740 (encrypted)