# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
88c7d9024ecbee706ac71d19febceb37545477ea8471a01cc3ee3d58b76cc70b
Pseudo Output
907a8fad2e5d2f49dcf13bc552016b486dab67abf3789b5fe6096cd3c5203700
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
1209d1a09839c9099ecede0d47f6a049f10a0a8b533125b29efc09e8ea16db5f
Commitment
9ea67840b38d8ad026998533b59df1e17ad216980917a76b83f7322d7db12c11
Range Proof
672 bytes (Bulletproof)
Memo
6e249174704f30dc583ad839a7104db8bfc738d3c09279e50307255809f72db023d6f556d198747b29e44012faf0fdc87850ef6ef7aaf83e6af561bf7ea802c776a7cdfcdeab1b0c0b5ed9280374a0313343db0eae1c08db9b40b5157936e1ddaf4564a441d164e1048a7c285eddb49bfaa9879083d0d4283734f5d12043b65a (encrypted)
Stealth Address
7c5b8cf340883fdd479963428be15e5bd634550b85864b8e2ab8490676023f2d
Commitment
4ed7f4fa565ccb9ba670f12e2e1ce2b26e3b1607f7763896da4e7729abe71832
Range Proof
672 bytes (Bulletproof)
Memo
8cfa699a60ca1bc9698b45cda103ca5bc09db093ba83f7be36ce26fc28306f903c7b9cbd73e7a2cc5a049dbd96b3f8d32851b10e50ba8a6a8996ab12a46bde543788315afe1e258619d0919bf9e02e2c14a036a7cd15cc1020bb18a1cacc55b0de489649a9416fc069ce15c69ef6c2db193f8565e0650dce3702d08a34dbf412 (encrypted)
Stealth Address
c41561a9535be528566580baef8068638448bd82dd3f6a914116eab34e816c1d
Commitment
d47feba17ea0bc320b28b8fa2e7c1183d47eead61dd3eda44fc03b47476d4035
Range Proof
672 bytes (Bulletproof)
Memo
056b291b06d1b52cf83ee20ff5f6e44d03e2580a7f1123e5f335f6e30469b9aa6e74744f108a3790baae1d9888c618c6a608da03bc863e1c51d3c32acc1cb2cda32607cdaa3f787740a0d39a5a869f82962bd6232d91180cd2d4091dd3692d2cb547cd3b1e63825bb2676bd84b1975fb79f0dcf9b5d42f9c26d30dd95976de18 (encrypted)