# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
a6a35a6c41c6567d96fd08086ef84a8355dce81adc68ae5d75a1e1899b207c02
Pseudo Output
70f24fa0ba7b6dbf5828a8af5c029145973dfa3cad0ac7645ab7670eca8ecb1b
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
124cd32cba9dd4918098b1231752e02e37d388efabc84d8633071db557663144
Commitment
74f7c5ced775206a464bfe07285126772bbe860727abb0fd090acb0a79638936
Range Proof
672 bytes (Bulletproof)
Memo
8f4022e66ea8ff59ebd55e4c6620f31f808a5e87ca171395dd56e1a0ca24f1c31c8f57e549038254d4a579c4cd04fd3a886cb77a7759bbc395f7bf52586dbcf29d95881f912923ccbdcc8fa0a6e764cda51f0b67ceb14f012568f36ac2e04ae0af42788f453df9c6d895a0db17dc3a8b22dbb7f509b8e2ad135fb87a1f75eeac (encrypted)
Stealth Address
d80df3382060acd704c610bdf396d4a3be1d9d7faf08c0fa633089d5e011dd0e
Commitment
e0a8515346cb8f306f4f7fd33fc2589ffa3c336f37c119233b95f2b07d1fbb55
Range Proof
672 bytes (Bulletproof)
Memo
52ea4820b389d1058892f7d835c17415366584f52ad5585c7d53bf2b3c873fbd302821d62a204aae804dd210b2ad6aed13fe469cfc240cf87debb1191d7628f5cfa2e29c7e8e3d9f1eef23c1a05460995852a85941e5662754e8799708352c28b05b1b0af597194964f6b3b6d92e3c2cc4022a479444f5e071f01cce0a03ffe4 (encrypted)
Stealth Address
3a110254838910f181e0d4b969acc9e15811beb2d0ebf2dbf1c4419d5241095a
Commitment
c6ad5abfd3f26e0c72d21cabb3e9af7509f14249cb6e5f6cc036f000260e872d
Range Proof
672 bytes (Bulletproof)
Memo
7a5d4ff5852c2b1fea6d7bfdcbf9ae73c50a95f3f49902c640198afecab9dbb3e5a60947e653840efdb96ef7b56fa4db6b17b50051c26a7cac6bd210617666710aa5c387fad13ec38041ce2bc3bbc3b034c486b35fa831600d55bb08637f2b65563e81b4ebce16ea6727140b2190f55a71656c89f245870ab1f37ca905c42c94 (encrypted)