# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
5038e5a9e9d5ba3fac4b853ec666d7c8b6d8c91e0131b85850248958dea8f60a
Pseudo Output
7483d2619d5f5d64aa328bb916241592dcf252560cdb8caf1ba4f18b6d7e596a
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
4a368e78f69981094cb9b38eb76d8b2bb0cdbb10e65ab4788a1a8cce25ec2142
Commitment
7ee317d2030a6e75baecff39054c666be45949b915188daebe326b9d38dd2e20
Range Proof
672 bytes (Bulletproof)
Memo
23aa99ab9d573190bd02a1ec20782729ea5db21efc69168362f9e4c04bef3a610601d243198eaab209c0bcdf7b679cedd0b21cdf0dfe7ef0173b5c584c30ce6172050f9d42b421493362bd0c946caa306d29b711ec0747b6f7fdbb07746ca2577fd774dcaaa8ec9474b8eea76ea83138f70a42c1bca5c7c7c9887bef9640cb52 (encrypted)
Stealth Address
7486f0cda7c6d2270af6cdbd9b868ec57796d7f72f445fa7bdbf444ab9320b66
Commitment
5a8790da2ef32e338de964009e7405914dfdc471f6a84d37d49b24c31e464546
Range Proof
672 bytes (Bulletproof)
Memo
df55b72534f4db151969ed8feab4c81164eedf21bffbcf867047341d059bb695709bdfd9a61ad59bef32db67b48394a18db1e40ed2b7a8fa3672fc777120d6f15ea822b4329e57515a5813ae1c7a5a0fb7e5a66800c0ea580675fb5aa867b47b53efe42e42f0e32d466396c467ae90be603a6b12420d63dc38436bb951b4e3ce (encrypted)
Stealth Address
e66f9eb9a911a6e569d9f3725457a8dc22bba0ad30c44001e83cf09f38965f7b
Commitment
66e10f4b997007ed7c1e6c016ee011f6dce92b1786e9c8d5ac3a84ac2e9bfe1e
Range Proof
672 bytes (Bulletproof)
Memo
851d47e096cc3dce2cc4418690ead428f8741b7f0fe7dcd26b639df03932b602d629a1db8234eb17f71f07be9bd3c4402738f7ab2b408265bd341692d2bceba8966188b350325a9ffbeaab91445588c7e46b7d8df5712727c085132321a5f01076c83b8ca496a3ef0a17365e2123f5a868bb9165e4caa8d9477b6834c07d3938 (encrypted)