# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
9e2cf6bfa14bb8cd2490537b80f3025274e68500bb145861ad2f6249dfe7c12e
Pseudo Output
7cc89b89025d6e4a332b3535c9ec6ada6bec3a2befa581406effdd8b8059967c
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
54fa02b9590f8804708987ecb9b9fb933bfda131bd55cdf1753b6d5c09dc9541
Commitment
025c8cd4ada674915225888c7f1a173c12783867ef43f3f8bf60f2b7178b984c
Range Proof
672 bytes (Bulletproof)
Memo
0b5c551af2807b23160a07b6e405caa257f3ff74d7046e9110f66e10f7e9eb3dfe9c56b3737268e31903babb5ad2fac40a8aec772c75f98a94c5014023b0239e49b7aaab8e7a7acd4609c9219327829d4c2a151c9cac749645417d1384dc5f2e138533679e7fb26f2500297cab3e5ca456cca97b8f8ff1277913083ba29cfeb6 (encrypted)
Stealth Address
688e9e793cc8b28cd6a5fc099695ad57f331b4857c2d8f01508cfa1650de093f
Commitment
1ad29abe5e7b05b6f243bbfa7e4c7c463ed4f4bce92b05c132dd7c14f5df9f45
Range Proof
672 bytes (Bulletproof)
Memo
ac0ac2b703c17ec778f984ad14a1ed6c2d75a3e35714124f3dabb4a428fce001a1ac50fe05828bf4612f6b85fd7e6c780e182341312b8be8a750b809d04082f38628b403bedbbbda6fa68c0e35223b94322e0cca282227b327e34bbef0076053dcff3eef9ac93d875b1c147f813214e30e0247e8bfaff9505c40c1adf428dcbd (encrypted)
Stealth Address
aed5133672e0236eb2bdc0d006e3b279e4e5035ba1cb0259d449d64592afe730
Commitment
6e05bb65092c1088fc97bf66a586cc4d6cd49a1b87c089e6540dc152fd885703
Range Proof
672 bytes (Bulletproof)
Memo
04cc0dcf38a350f70641dd9ec78aec2e57f20f058441f7047e95b62cc609c32693eda5200b394ee0754901e7ae437ce0d5e6ce83e638e7fa20fb1eab01facf9ea50ccaf191bf251c265d2e9879c3c19313727a21213158087ddf57bd3e7d76cc7b457a62d16a9511bf35c26264f99dfa086e2a0f21ceb71065b30a6c460e9165 (encrypted)