# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
b4f75de3bc7a863ba1e5ab36fe61b04fbdd16ff2f461ee5ca26549f3c69c3248
Pseudo Output
be3cba3b7682dbd206588f1bb3d027c63cc5c8593e5613adbaabf873d7125a29
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
5eed1337baa8ee21d0fe5c9967e905e813df4996be723c0b5ad9e91ed04af555
Commitment
660e075f98fe7e8f4511c2bdb8eabd39c3b72c74a1b43c5a05b2b7131b18c34d
Range Proof
672 bytes (Bulletproof)
Memo
4bc71720f52487b10e357bc8d09146c9450876f20928a415f38528ceecceccaedb4a5470db25bd06bcefe9512c1bb45ebc46c979f45899ad9b45bd24d848269f4a967bb6d5b62e8019b775369aa31884e356a1f2d59abd97119cd13d05de47be6312a42ad968bd4f7823a5a3890ca97dba64728a2d5ca0dc66f2fc685da07b4a (encrypted)
Stealth Address
a084e78ad86e695ece500ad353053075027649cb3cba8eff1d36c99d41910612
Commitment
8efe23bc6be4f9007dff88c67f357a685487525fb9468c585291704512da9f6b
Range Proof
672 bytes (Bulletproof)
Memo
8d201f675c13a25e3f0254e102de61895cd21e60fc784b7b673725290e3181faf7da0f39629b9c44d79b68c4958e564cb62440c578f799d8c21ec0b8406b9672a6fe837a6fdc65197e4eee1491682ed42b17be1a38bcc08b1fbc421cc1c825daaea56fb580c45867a2010e674680809b276feefbbfbbca2dc6f74e08187a6e40 (encrypted)
Stealth Address
e28967643f2a7f06bbe2db4761ad3c03c2004032b852062580f298055242ae0a
Commitment
606f2cb417b12336c8cb0c89ea0624a6b158de86f673b821f2c907817bf2144b
Range Proof
672 bytes (Bulletproof)
Memo
6739363a3fc529976fdaaf2c82ec2e2afc8d5dea6ba0b220ace9028ae3dcf12d00a761ab0bd38d07fbcab436a130ac7560fbb4fca165c958a0c36ed85bbeed456f5451d0d4135fac906cc2471c7efba5ef5a3137d4bbd512ee1a75aa677644601c5a11c75e56f67d34b81b98840d587ac1c354eb5ba4d8b9be9f614a48ada830 (encrypted)