# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
36c7e70fb756159b5733ca62b0899cd46880fe510bcb3a18a88f9b9ce6f8132b
Pseudo Output
ca5a10e0874c38700b862dc8f13db1e3932f97228b277dd4c07bdd7ba9ea3319
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
7c5a2653d69fc2c857c1c56d2b1917ff75d1b578da9541cc9b5b1bc6ac860408
Commitment
c25a7cc068225acceebd66aefaff1cc5d7a723a04e88c8a0cece9dd39ca14832
Range Proof
672 bytes (Bulletproof)
Memo
75cda286a47cd4da4bb0a314c612441ccd364ae2f1c717957b5d7210caffc751f2f177f1585ce0510439581799357b7266013d6efe325ec1a773e3b60880a7c881b4a457f2b8cfc47a287619b600e1c54fe279a32fc45653da20b0555fc5d9238ea57ecc70baca46a90acdccf11f7cf50cd1d5495ce21bac3e65799115d2e79f (encrypted)
Stealth Address
4200dc969a386ad7f1b264caec72cf9043964fd10f03a6e1e1c1b694c4c6f269
Commitment
0460bac3471331b14282731b2efeadd885523f1f6e6656d1118d0a789fe9dc58
Range Proof
672 bytes (Bulletproof)
Memo
09f8ec60aaa636758d2ff17820a5107bddb6060ad55549b4e9822757d54ffe105d1a87ac6d631bfa49c0b2b0fc81f338a329060941654a13c6da865b7eaaab73fe8a47f57f7bd555972161c0d839c9f10df65f479d4493c0561c75e10de0cc19707a62c2a14c91b379e53df773d5dadf6fc13c120111df9a64ed705d3ddd04a2 (encrypted)
Stealth Address
381b5ef032bf150d4b62333bd9f03e738a6a675535e16eec56f9ceef20515145
Commitment
f64fae9109741f289774b694c0227bc6dc519e10a6bb0055892d1669256c805a
Range Proof
672 bytes (Bulletproof)
Memo
b43b8a45ed429915bc09cbe3be3e88d689cd723e0ec1c765c5d648848acd59dde74cee0830039e32190858fc186494b2de795c3bd15357a98335ecac67cb49e19de8afc8f8695b8fb684cf5d9a14dd94a878348fb5e950485037927bce6025342bf74982a7f712ef61bbad9d5a98d65f9b71fb137ce5a60b3f505417741bc01f (encrypted)