# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
d83bde87b61f832cdf2a798b194f3cc05b5f12d04a0f5d07f3a978f2c1996371
Pseudo Output
841bcee88f6d55b1b0c6039aca15cad8265a972d7bf44c783290447948a1df43
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
94c524b5bc475c72fc53135c83180f5510e1e6f96efac471889144712870b317
Commitment
fcb22bafae761783eb5fbb17b7e6d1124fbd82ad7aa4d1a8b7e8ee666a215f02
Range Proof
672 bytes (Bulletproof)
Memo
a8d8ead286b77a8eb48f492c26b86c2932f6fbb51bae5bdddb4864e5b280925126f1ed9492b9c9c667714160574ee52afe24d2bee2f7b200616e9d4a5dd51c0b8be20f750833c676b5f2286a2610d524f3081f39cbf87615133c6c70e6a40b4b626f5890bdca03d1ecc7fec0121889c95e4d697a2e682fbbf93ac8d83cf472eb (encrypted)
Stealth Address
da39f228f7249538451a3df31257ce92fe450ddd3a46ba2b04328b81f88f6a6a
Commitment
b2808de527d38885e2ab374cded242c90cd7f86b7372753edba19e790e31f903
Range Proof
672 bytes (Bulletproof)
Memo
24554f88068d41708bf8f2bce16b849d8586c2ee5fce21e1485bf5bdc169bfe23b169706aa7876561f313d510f68cc557e79d24260e78b1966a8f5d18d24730f2c71c35c7bb141e83b003f6a72d2c09987771f53b94ff52cba255b56e5c8638228d9ac074834452f5ae1cdbe5aa09907ad07a66d3984d2260218d8db5d55eee1 (encrypted)
Stealth Address
ec3dfad8392f640a0a3fa3fb0cede6e033777adb2f25c2120155df1860540445
Commitment
0231c85e190c6ac498f6f3dfe530d21bd14087f11ef8e27908632c2f376b2d1b
Range Proof
672 bytes (Bulletproof)
Memo
0a398e2d446e5c354c17468eaf2d57f971334657c386d4deb8957d99de29baa39c824853b9a751450cf5c5b2f6d4b5e446fba97eeef8d3a1681ef83e986b1e17bf6e622e6030570b55f14dd35386ae1f2451b98a51e2797fec35f99b1570a76cfa03f995bce4c669655749eb5c1ccff8384b30eaad86712b5412e7c0ab94211d (encrypted)