# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
dcb7aec35e5777e07c958e487075f951c48a96f661aea1bb0dc8594b679f3a0c
Pseudo Output
0af231045c0f888664cad45f20f047df8a632d5cdd22b8b4a7f535ac75fa145a
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
d6d77de570249df75bc43f44f610eab12df80ee5cf9d29412748b71977d0a831
Commitment
b6c7e3acee94b7e5dc978e54115e029ac275948dd6715ea8ac6980d28527e159
Range Proof
672 bytes (Bulletproof)
Memo
508a6b9b12c9ecd20f33abb5ecbf1fe9d742bd8363a2018ea084b0507c8391a2468eaa873bd0a9fe0741218f9901428bea4d201fc41d320f4e092d9c8cbf0aa73834c114e7f5b8b99fca7cac3b3c1ab6164fa55056b6ee2a0c897333aa5b9766dd706394c8ca70e294b2ab57e100dd30db7f2b24aab3e57f8e9b46ec051845d0 (encrypted)
Stealth Address
d490e21e2bbc5ba214c240946c5447706bda157a42d12ac4a277535ac7f04a67
Commitment
d098d7c24e57fd0a76aed7a403d920ed6d55cd088b43e396b17ee2ea09d45a15
Range Proof
672 bytes (Bulletproof)
Memo
bfae2adc341a0f8619d15490dc2a021131247bf759e4a8423650cc6b8e386a622b919150f8ad5126ef622f96323009beed8f41d532df1097f42cfd55e82253dda4eb5c66c794c73a93b325609ab646462c10ce154d90697468c0ff45c2d079ebcc88e9b34cee47ef391ecf63afc3e962b7c375f2d0575de1c3185a3a84bab256 (encrypted)
Stealth Address
7a074856c3edf248ba16d04d031bb32ff13f9fae6c7c7172bec28a5362350428
Commitment
e49ea8bf65359c813c2fe0548c6182ad26e176445ddcce80a3b1c37e6f78f665
Range Proof
672 bytes (Bulletproof)
Memo
fd44713c6a32da09a9fef47fe538115ff58bffd3dfa5dd2d77bef5c6eeb8e095e80567526de30fce32b03add20c90bf2a7d43d15dd1a108439cfd51065a7118de652f26d0c0a9e3095573c5e06283a105f2d22def18425fe30c7a3e86e825c4c6bd934d02d44cb68dce8611b27db7939d70c359c449301c5166331f9fe05b56a (encrypted)