# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
16428f63e96b46b30e74265defc188ad4f02ba11113c61490b973bc4fce50553
Pseudo Output
6cf0250aff254d55f1dfe3b9091c0a289d647064b57f69bff2fe3794cae8b306
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
0e9d1e89eb43ed4e3322ce334dc894e59b52b789f37a1cd6c125180ff898471a
Commitment
90764673b0d5d783a446d16b80236093d404f7569d7d65d20923531b23ead227
Range Proof
672 bytes (Bulletproof)
Memo
1a5906539700fa15445c8de146e2cc9e9f5e1c7139b2d5e4c853184f5f84e5747a7e082429172aae92dbcf42d9949fe0da831b22c57853f7970752decccf6e9aae752c17ce794b9cab5ab683fc9341f5bb412f9e3f6ef3db723fa1962eefd059a02dc9d08dc8350ec41e983e1dcf37618500d3fff768c6def24029b3fa59540c (encrypted)
Stealth Address
86ce82197a029054a1ef007b97d26a56e8149f2e729dac90d591797230bf1873
Commitment
74791c8a0d3e2b0e46a2da573910065ee0851e605eb4412dd6ab77f7e45ea410
Range Proof
672 bytes (Bulletproof)
Memo
33821d8fbd7df9e6fd03d357a168768939da91f3e2f5739dee0c1993a97ef9f4ee69c8cb60ecd9af393dbf909ac23cf5a19674bea6d056b5608cbe0e0a51d857b024944dfb91f3ec1e94bc5156f60ffddbee6f1d6f8838121f855ebd061355e74a05e4f58f84e2ef15c8c38f821dbfef694d7024afdd9a7d1f86b4eb9ea21ede (encrypted)
Stealth Address
768a7e6a40454cfa82a77f32daa4df484c680f1f93210294b65ce5e21888854e
Commitment
8a9d3b0734de33aa9ac1bd06189b254c018e3799d7a123dd4a4a802670b78314
Range Proof
672 bytes (Bulletproof)
Memo
b541e34eabc622d69adbac2640af3335cc814ee52db7fa7450546ea75d5d385f72a9cb7cb108047a094eee8b80587868dada2ed524d82fe59424bfcbabc88a1ddd200fa02a2b80155eebfba97a15ed52ff1080878c63582e9708dcab35a8e918b68b040702b4f6846d35a858bc6b36a949247ba22270667ecefdbacf890b0353 (encrypted)