# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
7cc5e2b3998ef68de4beee9c3add97056593c0a156f146912b0b1d7fb6f2d141
Pseudo Output
0a1807d04003e46be2a2a964668b0a7c04152d8db23b93fc62907191aa4af004
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
4c41eef4db256fa601d447f5730ccab4afddc5027007b54eac5178dd5d73f42e
Commitment
e8b54a311d98b22d54831ea035bf0117cc01973b024dad9a070fffb19b670344
Range Proof
672 bytes (Bulletproof)
Memo
0a5f1d809dcd3229c935cb4e52628bec0813bfd2af485fdacb02fd774b4f133902853615a92d1cd506d4dc2490b8e759135932bd2b002369b989b09ba98045eedd148b27ca8913b4081ddaab2b8cc970bdb89803fefdbdc0dfcf01c409b7c1ab434f8b70a3e675f273efc45033c804681ae9c82945f28b3375be04744c103568 (encrypted)
Stealth Address
5487160c38dac1cb2abb359b75ac75add2962855ccd3df62e8bd22804580e63f
Commitment
d4e9ec8fa7ce7000029bd8365b5f5b637d47d575618d9bf2afdad2b38847664b
Range Proof
672 bytes (Bulletproof)
Memo
7871c67ee0397127b81a2e7de0186f2bd9dfb3f984359f06efea0fa4d86f70421752e4ac92e1561901621e262d8aa3ad9d05c9b93c7d131e500e3f9cd99c8d9a72774f70f95eb3ba7e9f0f13a3768ce050337dc98950125f3297269827bbe1ecd05b58c014144435152ef6aef9b9fb35680f9c22985847f66250a73f579648a8 (encrypted)
Stealth Address
84c6b2396d0c65b9212719176111d9191921595baad20d61b4f7accb58268838
Commitment
a452c8476f927f2583cefb0147d73690e26b33dd0185538eb33c02e0c02b9a49
Range Proof
672 bytes (Bulletproof)
Memo
917d63a13c46aa0537d5d2ec4496e67c5d9993abd6c0985a007005a30505cb1ebfbb4d9af5844174199119d9915df1943736f1295a96c1bacd0fa7d79c49b2eb39413fc82aa56d083e56332c3133753bb45b2417f808e4e5d7b24970e9ac96c3aca27bdd09c3b55d761910691f0ad68e4666e1bc24764b6614467183ef60eb12 (encrypted)