# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
d2730fa9e3591e123549e3956dc141771986813de4e48d3f69cd766e573d0472
Pseudo Output
e02c3230cd0993a6859fe8e9d972709064b9fb9f3aa4ec7856798233dbeeec4e
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
14a073f72d6cee0754a9f04f86cc77f71debaf8454fda835c1d79442eccca702
Commitment
dac4c5a19ffe2576a8ba0cf75c797c7bb76dbd11b363cc8daf9d91dbc6167659
Range Proof
672 bytes (Bulletproof)
Memo
76c518a22a92334d01d89fc1b762eff363f0c76210dba184a88ae02324d6e040fd11346bffc15cf4ad1d1d7bcc76cbd16a0253f15bc4802e67b0fe24f69b8cf8f11e64a8a15fc487e4d9b426885efce5347b24975f47bcd2e23ad8db4bb7fb7dc333396e73d119f8796a50ae952510739e4450793fb9eb59ffcecc9793e5deec (encrypted)
Stealth Address
9ef6cd7e18e8c598eb40145aa08c511f7de12f5611d21f79e792b322a66a426f
Commitment
c6c31ed1506514b7303ee51d6e0b67ae4bc5a401fc0719abde387291ecb18e11
Range Proof
672 bytes (Bulletproof)
Memo
5a3d6e309fa8f69cf993ca1d0b41a21f40127c405737c1d7cf938cd491e4a1ffa179910407154b55193dc2035257be4da7e635e82fdcf04825758dfce1837dacc98c3a713c0fdd86fa29c21df4b0ce89ccb5aa21c90ba789cb518af1932a1d00e70b3b15c0cbfcbb29eac933d3493487284adf88525c2094ae36a8850a02e551 (encrypted)
Stealth Address
c644dd175f435ed92df11ae517470d42c28873d7106e3235f2f90103e743e62e
Commitment
46303bace06dd9e8fc9eef0cf0c07847eab04834e985a99bb9d530fff2546011
Range Proof
672 bytes (Bulletproof)
Memo
9153b9e0af8fc41abcad38004024f58ea7b0a5570e99ff0a59eed92f1d1d6f973d8aea224231eb60158aea0fe0a40b4b63250234f945cd987b2a4fa6d81bf0fe797efff4b2af66321c8256ed15acfe47644b7d979a1748e76d69e7afe0909db03a928d2c80cbb5130dd678157eecd77b27616534bb565158d09908ea4e038bde (encrypted)