# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
e8fe3f3e8b61241743f7cda85c85877ea17f2e9b4e5286a6c6287834cf9b343c
Pseudo Output
028d3add39dfc27874ed38686162c8a488d56525508727c6adc5b3e1ce6e1958
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
9a80b637a28045be0c13910fd729f088751395cb65d46a9b3acc372a63437569
Commitment
324712444aef8b8be644092a70782b90113cfd641e0bc2035c41be10b8b39310
Range Proof
672 bytes (Bulletproof)
Memo
8da3cb7e1a475382f6d5afecc4764a145349bd0b5125dd0414c91e4ea8e4c51f287612d995664dbff8c4ac9dc54e529c26f77a0446b3ea20147d57711122f7254653e3231471eaae3155319fb6651efe25068bf01b958abfa3ff27096392023cdb9a2158c6e49e7fd7e5040a717c90f20874795bf769e9f8d5df48d1f0c31dda (encrypted)
Stealth Address
5ac626348774426376dd613b5374e9024cf15271d82a42d383e2e96bdbd6c007
Commitment
80c1d0d1aaa9db9b6ed9d74cd3d9c69471b304a0b268b08640a9aab054235647
Range Proof
672 bytes (Bulletproof)
Memo
c616ebb284dceb62c7ba7ae77a7fff0bbbeb0bdece49e109bf26d6e6e8f151ac224e306af87a85869d7b8a12fca3a665d4ca50764e2ff6ee2222e2906ff59b19c8be98557f204d85c740bb527d2d3e1da2a181c3ca5f20eb754a65966a940d11d14ac64cd10d641ae630bc5626d3f0a174fcb44d748cdc04bdd2ac96ea7175bd (encrypted)
Stealth Address
72ba579e23abfeb0dc21f3524ada868c05e89ac35b998e5058a87a5c782f5318
Commitment
10af0edb7a95257d2c09ca058b83eb3ebe1aab3875b4ca5d8ffb388d29b3e600
Range Proof
672 bytes (Bulletproof)
Memo
698186cb0e049d9963d5a4c22f0c774d24ff05e4cb72515bba07b19e2c9432a29374880d6e239de95094ce0fe325484a0883af2b36f454d87ecc850e177ccb6397b721cc78aced79bc4d20759e4acde287b4417f9c95efcc7b0b66eebaf97f0e31c205e34dd45e332b8ec9104c2d37ff04cddb51f7208f88e0765a365f03e27d (encrypted)