# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
7aeefd1c396b8255789ee31fa068d25b049bbeefde0b51f8897cdc7407982a2d
Pseudo Output
dc4708eda046791f47fb4724302f6f5958b6d7f6c4aceef13a11ecdbb2083830
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
7e159c82ebdf051509257c2b8bab189095c42ba44468c09aab9407c39bb33f7b
Commitment
7c00dcc3435e05f6dea793a53078615946efadaeff7f609708365b9c9aa62039
Range Proof
672 bytes (Bulletproof)
Memo
0dd450c7af4f7ebcfe4050e9f4ff737b9b76f130d3c360046dfc691132d9b188db95d18ebfb7e69a6e29264aafb727cd29a9ad1dcdc91958f8c0b177361cf2479d059c5209bb7f0380069b4e475e95c7ce79f577b59761a96ec47d4beec47422cb7ec06f7d3b71b1086efd327e6f01e5cebcc597e1fa664551324349b3d1b279 (encrypted)
Stealth Address
c472417ae9a55fe53ee01ccb31ac249b854dd31349e4b2f7f5b597f7a5bf7032
Commitment
24106da32f25fa694eb3ca1e85e6b60754c05e26c295c10578db9278d8508254
Range Proof
672 bytes (Bulletproof)
Memo
091e0a306a06f9d74ff2fcdd783d7331f13ff03703e9b9aa1d341762af8b4fc04bb47be6548a666cc3438b3fa918a99cd70e45115d6da9ec21de804a834ba181527bdeb8143ba531c4580d5e0b83394e4665136530c7f55bde140a6bc8e3f2787c0a97bbcc060c89ca1c756eb35bae28e11b3d04d58e2112e303bd455cb9f36e (encrypted)
Stealth Address
30b2aaa9eca77c824387d204188b714e64af408ded0c07a57b063948bb4f6633
Commitment
a6c3e2f5983fcf867a221e29fbe59eccb12bce0d299b115abc6d205af7d8ee32
Range Proof
672 bytes (Bulletproof)
Memo
3bda663ee4916cf2a621dc613e7e7482f1f03d369f6331b0aa43d6c863e96a192245d4775efc0ef50cdcc58106a85f441c3697a3dbccb1241d756b0700d561e886cf90f0e9b90976b59a3a251a6f52aa85a6da1d10f4615605b62971cb8b27918bd4743b4b27924f97a38ea50f66d264ae77b3604eac89e79a3665a3130a7530 (encrypted)