# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
e4362325c8f9d86d31f860bf9573bfef11dcc00cb283a0c864d80f0df91e3e7c
Pseudo Output
4ce8cda3523ce1e10c697dd195610ce0a674b593b8e83c8ce38ec4d36ccf5e75
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
8a9878e556fd2c0c20e3b7c290bd2bb1767dd782082d68919e3897c538fda561
Commitment
2407651ccb63a5ef926e961ce14bbac6f14f250512b69ade9e43d6682dbfc708
Range Proof
672 bytes (Bulletproof)
Memo
7ec4ff0c099b204f7a6f68b8d2b8285ea06e0bd32861b2129b399f0240c1f7d25bf9bc96892fb9958656c718d2c129a0d32e492791927ceb338633e4d6a8bcab3cb46e149f8d7135b42a909a8ab1bc777ab3b9bfb7b71b693781629697ca9ee0433eb3fd8d05c41c8cf8583ad9aedd81de6c1a2b05563d2fe69e3a4971d5bcd3 (encrypted)
Stealth Address
c657202d6092c3e500ef51b0c78e24691953d085a7d4a6c2dedf6ba94d095721
Commitment
569520663579ab8649a088866034d863cb085da151bbf97b0a9877146b3fa14e
Range Proof
672 bytes (Bulletproof)
Memo
3862227aa30c3be49a8ec09e708bd520e1f73cd1652f4c0f512a97138abc29be85d8ab22bfb0c96fffc238ec5c75e52a14b3c4bdaaf8dbcbfdfef731569a902193f0e5d3c0c322293156f505e7d033ebf447f7473368e366d7c6172e6ca941a6e41aebe35ed560d2d859c596ab97f5162fbef5cf521654c428428ad54fe1524b (encrypted)
Stealth Address
ace73a2333ffce3b1a0774d5578457179015591e8e856f67c7e984da16b3d456
Commitment
d6df0372bba30f7cdcf30bc30aa051fcb1c2d60fbf0fb7b34dc0a0c47b1cea2f
Range Proof
672 bytes (Bulletproof)
Memo
bfb912a8defc368a65097ffa40ef1af6f402df32abb23148003f1e5fd7ac0b4ed62dd31b055d51b4da60a336f54a8d71189ef61ed1b811d3c19e795c844907c1937bfe2b9b96675bffda10e963bcd5d6f341dd51731a99c3293fee0bf550d8c0bfb1abbc0a15c78351fb7b8d14e1ef6d9dbbf557628b167c7528c4db0ead7b41 (encrypted)