# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
488bcf5297b2486f4de50cbe6d58248732600b6775ac50c1d6304f2c8d8dde38
Pseudo Output
eab21acb5462f689aaa83ef252be77b44b76c84c1bb125648ec92e98532cfd33
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
9cc7c80554beceb6ffa2ad93729629ea375c896609c2f6a9be3381af51141865
Commitment
dec722c31191b5cb0923effb89a7b151d623c32f7e7d4ee80aebf4a1dc126c57
Range Proof
672 bytes (Bulletproof)
Memo
cb7c35f481e5c107283bc1ea39bd9b1e2b6c42f6dc2394b58cd04e5604942a78fe76ef98e404edd435acb23a310cb2d3730f6caa9a8218eebb53b068a675b540b6ec99fb57f014d8bbff625b9f7080338bd4700736e431ef0f6135e494a9bc28f5c1d54d6d3cc397be2dc0b0e65bc298e2252619ae3a1613c0003d344e34a4c3 (encrypted)
Stealth Address
0e7b9bfb370bfbeb325ead22f5cf56bc6d93d03361bee3684b85c61b6f7f4d5c
Commitment
3e60d963ca5a755754771262f4c8a0b1c3d893afc8e0865ddc477a6319589900
Range Proof
672 bytes (Bulletproof)
Memo
1d7bb5765d1c57ed48bfb2e9dcdac303c764a8ffe151de2dcb3405242f6f2624c6b62aa3708c6495a9d98a15bdffcb5b61247782f0b65cba17fbf084380c61f7c4333d5934eb574db668469fa3c0b2ec7e2abe17c4ea0e8d46b69979bdee45ac3bcb4c2a8738f4a1d61c35b045ba833d12e020fb6191d1dfe39f1c7712f58a36 (encrypted)
Stealth Address
64add8c647b1f6ab74dc5dd2b5539a4712000e64cb9ea7c8a4831943c73afb50
Commitment
fa05040755d07b04eb87fb51d80aa131815ec2ff470f91077e2c15d350393d2a
Range Proof
672 bytes (Bulletproof)
Memo
62e17e7b8a7c023162fda4d7e4270c7761b052b5f0d54fc051ecc8a1b7486cc26d475da7f656c245d25b967b5f644e7f530d064ee66863d261ab30f5592412e65ce06859658bfcfcb92703296373ccfa7eee6da3587bfaf50ffb12debd0851c679a962d059059d0bed369fa0e0c5df87e7107479f19939ba909eb0a4b508f9d8 (encrypted)