# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
fa9dd5e869d8df8d4328f12d218345e5dbff24d2c46ba6f88510a7a370054a79
Pseudo Output
3cd082c0c95870723fc88450899afa69ae01ef0cae503e328d4c0158257c4c42
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
5ef29585a4897c698674a22e5fc1bfe6a2eb95273d1d70396b34780f285b9439
Commitment
8c51b1b52394a541a704e4db3f3b425871d4c7f0cea5f5f7719d82127f395f6a
Range Proof
672 bytes (Bulletproof)
Memo
9a3a551fc6a3f93b31463ab4bdc9451043d799476b0a16297517245329164e4828912d564c6adbc1254a00798f80cf82650869fae15d59937b93070773baa317f5a3fb0245df76c3e1a77adb49bf18d76720fe92f94e922ad3272617c96c844e0e3e73ee93e12c6a6dc7b5a09e4985c81ef68614e83fdae5377ec02d9d5dc984 (encrypted)
Stealth Address
dc159a98467dfa56dd4c5f78f5af78fe0ff7e5390c9d1f31e9004b77ecbeed4f
Commitment
b86f2b81ba2fccdc32036549d6781825ca4939e7c181467a2ac9cdc3a5315d40
Range Proof
672 bytes (Bulletproof)
Memo
68ad9e71b24a546213ee018fe791f5442cb484d95d1a30ed799bb3aa238c5f5a5e74b5753d463a5cfedf2269cc413653369e2797f91aa15c1fbb074cc7eb9e8d5c002d2fc71758e5caf696caf27b55c62ec226cb947d9ce09fc295caa121524685cda20ca6958ae90cfe8a373a67859709b9fd7fb5a7ecaa93d609f44c81637c (encrypted)
Stealth Address
066870c55c66f2cf42fd7f4503dd4b90f034c68a5603de4c150d91da6da2ec07
Commitment
64f50f5c544e8f4c363def5d1aca9b402a9405c0b8f0984eac5c6ca5087b7366
Range Proof
672 bytes (Bulletproof)
Memo
8c7bc9df119250c86070218c4ff83743822b4a7f42d023ac9f2266455d831c0c2c4d2a45e3939994c283996c66cf02154b55799d07e20f70307f3d8ffb4a011ec735fdf7a171b00eaeef3096f04fd85344ef834adddc81e82a3e8b3e52aa804b450bd22bb369c7a1f151126c2ac76a8c886e9455e114c5cdfede062192e00abb (encrypted)