# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
7e829545c79b748d8017e8de451e472aa1d0db842f95f2875b73e4654663b241
Pseudo Output
529d3cbc0548ae6c43e0e3829ab4ba21964014492e254759f902b4e125ee5b64
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
a0c4354057ae73df7923569767f63f9f288eaec539f32a880683c6c07ed74e75
Commitment
e4f2c09e30e048a770258512107b17c9f78b99b59c308c9ffc693ea9f686f359
Range Proof
672 bytes (Bulletproof)
Memo
bc26b522cc86c2d270f69fada3b92814389a49192492e3c6c2a3bbbd9a16300688977fb68c6c8d7c9c69d75f333207554a8bba7224d9908f7cac33928c59f7699739e37ee8f8ba566e61493eec90536d5932664ab7a92fe42eb20bb2d707c7a67291946caee2f5326865527f4aad195c599e2aff87cb0228b6f9201cf35e7c8b (encrypted)
Stealth Address
761007ac8869e412c81c08ede2790228d4bcbce91c64c9122e0349acec171a29
Commitment
aeca8ae5f3f574426bd35f6fee7764e92f12db294edbc83a477f445bc9fc0948
Range Proof
672 bytes (Bulletproof)
Memo
093a80e03dc156d026baa0dffffc3333fdde27ba58ee70ca1f00d7305de15eec511fdfd479cb795c44a320588fc8cd997a7295b824f09ae79b07beb5c24689f80d1ee81c4d123d7a111abad1c64b7f71d149ea107186b03700b4c2e0f841a52e35758dee83431333d289d25f67bb255107b70b953e1527e9360af8f8deb2f0b6 (encrypted)
Stealth Address
b489574ce21e98df5fcc4de536f965378f36d3bd71aaf19db9f72a77046cd26b
Commitment
2c866c0ad858d0aedb274affb7a989dc3f7b0c2fd8c4759ecdd32cadd103a62f
Range Proof
672 bytes (Bulletproof)
Memo
62c80d9e0da9e54e5493c5375256f5d3cf1722b3904bf5d150893493ad0ea8656634b195d67572fe25d4895d25a79d9462725f8bc8e74c9446dcbb9c6204902360cfc263ce374414481d2bf8bfc266ecd029ba6008346b1870570fd35997461888c2e4f17a25331b506712de29a215f4ed3066ef6789c899a842d3ba25b63af4 (encrypted)