# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
84d1e06c8cba47b3d80b40616cdf95ba118da4ad28fcafe03131b19b539d466f
Pseudo Output
c4757051ce4180e6ff888b4733e02b84eff9fa9be3f27ecb0b1da5f173d9b949
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
9eb1655e7d190a6a5811f75b696af560a5b94e0d77ba3b14479422fe7bc5f846
Commitment
acfd62dce8f45e3203cb6acaca3490cc5fc12e96c5ecbae18350ac8af833b62c
Range Proof
672 bytes (Bulletproof)
Memo
f04368cb38ea272770a42a291df5b842a343bf43fb20b9b7d2c028cf97bdce3518d913df553d63bafffe26f5cfb9ea48fa9dd2f25601f3283072e9fa15966af4568ce4faf43feb565509b64024854f064433fc13b3ef143f1f5981835db7bfc37f02742cdaa882294909fa40d72210c139deb5b9b917e0f64b343e19874d0278 (encrypted)
Stealth Address
708d892ef26d6b367e472bc5c6e316506c39071f4a199281e9b911602c87a85f
Commitment
9a96464d40100446aca8bd4988f4e282549cec765e0a540a9e6b213bd6937779
Range Proof
672 bytes (Bulletproof)
Memo
27c5526f2cfb51d140a325527da8cf3bdc22ff594738aa7272ddb44ec385e99297a29e132fa38a50522b39c072f620ec7291f3196547ffa85aa833e515e2966f609e529fe803fbb89af85116b1ec28c0d8c2e74959b2d946ba62424355d2e424197c77e3b0f7d80ae7654ff43435ebef34607d0188f0800a7e580778c6473ae4 (encrypted)
Stealth Address
7a9001f1c1727efa233284f1b00aea226aa2e79cb59a85861c70bb95aa96f04a
Commitment
88064e9b8cf67e4f233b0073c0287a3e933e98fe5ff9fa8c98e1bbbdf18e3158
Range Proof
672 bytes (Bulletproof)
Memo
c341f163514c4ab8b1bdf235e85f54f3fb774766eb9bee6c47e71eea75aeee5baab5c3343770c53a7f7be5092293a5c60ae66e01a0c58f55742b860634772587bf0a53f7c339cfbc228c49315316fc2f1fba22c98d889bae0e0480c10a98ad13f63b0b899f160922c25cecd42b728d964a417b69dcf7df750002744b24a5cf49 (encrypted)