# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
aca7e801cf18cfd8759cc67d4d5e0a4c0ff1fa70357da8101a30967db2db2a1f
Pseudo Output
185e40d2cfa6134851590ff8991736a9642b7d8be15f635052245e3b4a65db5c
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
7600b65748fcaa7925ed10672adc72bfeed3380a985524e4d07b2980ce28f437
Commitment
308ed6c2243deab5250f1b471672da86d98d81a732edb0767205a724140b2a3c
Range Proof
672 bytes (Bulletproof)
Memo
9a939b499fcf8992e07ad07bf11ca19f8d61a4725d38a1f3b8eab57df1f1ca3dd125bf6f1426ac7e36cafd5e662d8cb33e4a6bbb73f6a68b687c2ef27c77bc8f076f736f94d1874a38572fb97811f66071e4e51c588dcac801d9aaa4d4319f8055db4931b5d0947915a1fd6f3d56cce58a5614c5e1dd252cf9f28411af9febb1 (encrypted)
Stealth Address
eca411b5b86e4e6b86b79587fe7e47c794d62aa068b1b52aeeb8ba2868db275e
Commitment
8c1c32b79e0410c007954c5d077aa208fb6053a974d5e406c3e5855e2efd8c57
Range Proof
672 bytes (Bulletproof)
Memo
d914c666609b3aa2661103f477d5b29a6ec3c1f1b96f55ba935921cbae63d31d8e3ca97bcddb4b13a76c744249d344bc9454aacce1cfc4e254bf17e27d3fcce4976b7b6e4029299df5983181017e9b88b70823eafec1da36d4e5cd6a59de2029210aebda5e62d944faae6ad1a04e02062f7ad40b392a52a564ce819395290164 (encrypted)
Stealth Address
7c554a89f106bf9b2274d0d7636fa56fb9539570149b0c1677b940803bc42e51
Commitment
acdf6e8ab54e49bad5485512265b646a8b1cd8a83ab879dbb370254646a68556
Range Proof
672 bytes (Bulletproof)
Memo
f44d64452ed1c16c1bef14f248b3b17472dae36b17ef94ca59de77ec5785c147ac347f9b9cf6117033f1d6ca652d908032dbcd72010ea12b8b56e89da7a51f135571eba7530118bea85209766009c4e67973332554cb2287c898553c696adf5de597f011e95564408bdcf967f086755f6fa19845d38a44efe2fbd342edcbf48b (encrypted)