# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
e8830f4785c072ee1ddcbdec6079d550ba06dbbbdc288e0fb68f1e7168665d49
Pseudo Output
d2dc2e0e1d0d58820214e18288c8432410a0878c2c36d5284857618251c6414e
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
da38d31e77b783da598ffccf7500f0107eed672005803e53a78c58187f3a4e0c
Commitment
a6cb815a49e804c49c34d051e4427c919f8cefea1afa7370a422179a7369481c
Range Proof
672 bytes (Bulletproof)
Memo
3a2742e345b08995ac3edc755277e13357bc247253470ee05c92228555204c6778b605ecb6ceced528221ca2b58fe24994532d163db82671434fefa84ba2d4ba86d4cc681a2f6808744a607075ce396b89bdb8de0be580826f4cc7674be892dfdc2aed2fb97664b6f067225f9c1bca31c29f6f2f64df8e910627ee9a97f3ccb7 (encrypted)
Stealth Address
8c220f64a39fec02bb2142d43e30abb2933a73d600e88e5c7790e460e2475d18
Commitment
246306b1361ac4f1483f47a7575f59bd0336a66a6a652e2d414538ddc3533e77
Range Proof
672 bytes (Bulletproof)
Memo
e73dce0f3e8bb936739613e8479e4ab8b59176267a99c172977767287afc123df24e5bf508ce0d03a8648e547aacc5584a0e0ce587e4c9af7b0cfdf1aeef2b5aa205fe930561813e7fb06773b7174cce371dd42bfbedc5a0e8e2ab6e7e8265c0affb5afddc034a6e15bcdbb99c80f285d30cab2ab40ea5812f117651517876ad (encrypted)
Stealth Address
48dc7c499ae534207272e54fed54db3496930a594d0a8c1602f43c8fb707a807
Commitment
e0e6a1d569223feefc8438ed9e2a7b3ae78883ce01b853d8dbb30eaa7cf5575e
Range Proof
672 bytes (Bulletproof)
Memo
68b9c9d00a9ca4253e772ccf832a102223424a317122f12cfd1177a963c40a8346828e44b7adc69e562558d0029af4c181b9bf280e38d6e962cbcc7ad096f30b76e45674df184ac7cc83b90fad1a66cf12efd9c6fce3c338394ed37690cae94c31bdb1baff848b8eeef3b1747e42f4472c8cc8e1d9fa90d6860e26e47854f716 (encrypted)