# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
b2f3dd6ef6f4662a41a5f25f5c4dbcf71a0f7a5b1ea83e492b5a3fb5feb07c05
Pseudo Output
54544f1cd7627f983bbfdc91c242d9223ce4ac3c6a8e82c058a3f83fbd9d2c61
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
76ed8836f8468657f399b6023b94ecaf3e29c7be488ce6be77334441e2d58768
Commitment
c8aa9c05bc8ffd6f36c1eeec11ac1a1705027ed11ed9246cd22d70794d6bd757
Range Proof
672 bytes (Bulletproof)
Memo
ba607535614740b302644be07903a24745697b5c6b97751a3f8f09800f8d69f002f1cb3b12cbbb35ac0d689926f93c609a28f01ccd3a142800f549c90d91ba5ea5c9aca0def02098867e64986426f2539dc5aba8a518a3b973081807206596ec249c29933e919b28ead7d1ffeefdc5781710781f7160c9aa9ee9a233518e86bd (encrypted)
Stealth Address
124e4395ab5bd2d284fabbf35ef4f30d95d08eea59ca860f3d12ff84969fed4d
Commitment
78267125744df282da5322b4b77d6f1fada4b7577b286a7980e2df76352d723a
Range Proof
672 bytes (Bulletproof)
Memo
190a4587cb8a0b54563b401251ccec3c6f5f58fab4b5d3d0cec7c1be01a5b79df040fc937cfbdfe5958aea52a720904ba2abaef9f60f1f78ffbcf5827426c05065d312c4834e5c2b626b1882e030e80b13dfcdaf0d24fe79f5a0aad8e3bf6cf9783e06814ecaf5545567b605da3cad1d708b8325caa2083d2bf9326283dc651e (encrypted)
Stealth Address
e6bbe561296877f6aadb814d812a69442caf134695e29e429b19153636948e41
Commitment
661e294b13d43ba26414855d581a36c0ab84d1cc3a23ecdc42bd7c0a7dafce76
Range Proof
672 bytes (Bulletproof)
Memo
5fa57b82535fae7984dcba53ba7ab535c1759fc0c5890ff08309ef3ba16b71f394e845e2acc9024f1b352e4eb56082aeb4f904d1d3e83c0d894106b585a46b3540fe09582c1822a235ecad919623c8e54bf06dc5b984e79a7613e545b8e820b00838b9ca38207691c56ad99e1cfe83be4c2cac2fc35182ff6ed58f03d5b3bf82 (encrypted)