# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
da77094d6bad09887c17bfbd824540a44e6d68d30bd3a245fc250ad6a35b4e43
Pseudo Output
88b6a5da1111d769088d2d93e3bb059586134aeb664a6d62b106118407a5aa5c
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
e647f1773167362eb8e4ceef584d1896d0f0539be20cdc2588e1cff749ef9130
Commitment
9ab521413a7de1d3b919a5a769acdb9145b3f42d66fa1ff3505fa6228721eb2c
Range Proof
672 bytes (Bulletproof)
Memo
26756d5fbec739ee7e569c46b3370d51ddb190e8194dcb38c1d1b2f6fb1b4ffdb611a4d784d442caf45c6ef127daf3b50b536749534c1b75c378f854d989797153f349e845275a97b5a60ace808bc43a721da588bc9f6f7e558672f0e799fb78e548ad4c7e4be538d6943c5f1380ac79ea7f6d29599f22893562f7a055b83c80 (encrypted)
Stealth Address
106503b29bfba73166c20502b0d641fa49fbfb351ef82423577a7dfeba4ce529
Commitment
92ab2f58d52da6ae88822866576f73cc0064591282bb1dabd528cea7893a9921
Range Proof
672 bytes (Bulletproof)
Memo
4a7afb82d84c2958a750a37314bf2bcf59cea487276a2e1ce86882da13ed6b894352729bcb76df0f2f41e665db52dc8330b180d8c94d0da4a645885f51f88e16844ce2fe81e0a95b23ae957870c03d4df7467a95cf850645fae26cd246b6e9f41065f1e9b645d885ef86a9ba84d286390292b9f5a9fd2f7ea79df75be397676d (encrypted)
Stealth Address
644629b18b79c1a920651565ee5125865bc46bcd8ebbbc38d327d84a870db070
Commitment
444419e1725874a40a8cd30e9526aaa8f7a1becb2acf9715c9a7f9e9af35cc38
Range Proof
672 bytes (Bulletproof)
Memo
5ee8231e7d866cf9900858d85df2955df345e98c2868a28886dd281142342458985b9eee8a8f79826305f0f995b0363fe6120cd6ab118a58124f9c097b1ff6fd9eac7290816e32eb3059e65eba454f25c3bb14e22ef30273eac976cb64271546a52ae6dbaf360094dcb29b9cdf7e8295f95846ccbbb71e897bf547baf7743c87 (encrypted)