# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
9caebcede78159ad1a4a5ba863d154c35ffa36a0f9119bc5646b066bf65afb5b
Pseudo Output
88ca5db0affb6af85c2b600620fc4940331f4cb27e5652eaa1e6bdb09e0dc046
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
f458a85ac1375f86830aef236bc8f9967addc4246cc11c8836d36cf3f412fb41
Commitment
d6385e7cc053f92ab068eaced1822338ac2a83ec0171a27cfea7be32f807ad4a
Range Proof
672 bytes (Bulletproof)
Memo
0b8ebb77862d2a1fb9868f72b5a6b0d5363230c33ab64d9a6d403038998d4534edc0902468ab03066846762f03f0add8cd875be7daf548b112852204fb0fe6979928f5061d488aff9a9a209254bc1898e8b89c089995a391185b59c6a15185d9f0dfe4d37812137ad13379bcb63553190bd27e03af43bffb61c98f7425072cac (encrypted)
Stealth Address
b4857118e2ce750f3626550930bb2a4b14854792aae7cbe553b2b01022a4c743
Commitment
d8a6703b2ca5ecdf200eb54a3761932556b01a3777d65a79f01b62eac52b2c17
Range Proof
672 bytes (Bulletproof)
Memo
818c0b4b4f5d3eeef46fe3406543ebd2852d0e02f218e80a0081c3137be347c32873bdbf717ae8898a09b6b5676626d11c554fa7e3dcd09a025c12c2e40958045f19fd30184693e9e1497b22f17901ef7495a6ea9eb3724136df449d98a1ff423672d7685906307e0dda15a662d2fae66879ac9c00b9effc95a07378848f3704 (encrypted)
Stealth Address
920eebd946873454a13fae512e5534b84454f25004d71bea45c55cd7db315400
Commitment
cc2e7b643402b879b17e833c3a182c36147da17353229aa127ef486b3f36cf55
Range Proof
672 bytes (Bulletproof)
Memo
4ea72e8b38d19546ec54e9b6fe323aa4339c6483a57813722f4705ddfbc8b0a18bbc09042d7c170f97b21110e9d75d535c8bcce0fb43ddd8db0126ad489b2b694e9a243058fb5e4753f50c028ce2906e775dfee6d6d2fecbf90ed39ec53c296afab9cf27c3d42acb82cc7dba568ccd61ce086d1de4bdea9822be9744ada7f926 (encrypted)