# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
7c9cb09c7fc00d75eb278ad6d1fd52bdbf112d51d022a2e3e82cb4be99785949
Pseudo Output
e86c5d2aba0a6f61dadd75f7cd52f8682197c419228320c89668c38f2eec7857
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
e6ec5af9129bfe90f777cfbbd329fc02507b92fadec60de5503954d858546b2a
Commitment
a43ed806ea2c6229db85395a1f7b89144dbffd8943bd1552597a867e4736f164
Range Proof
672 bytes (Bulletproof)
Memo
0a9af914f9048d3a3b7b1b61ca5d2b1f7e8482e0ce0268970096e00a60b9365dc773ddde2e963f8db7991bf6be7a831cfd09430ce4bfc1b9ee45435f3a988a066263d2cfc2acef344e352e7bf5b237bdc4f1a3ce0fc62ce5b161eff3040cabd04bc883bf40d3dc6bb2f1915e477d23756b7c61b3c5bb4afe4c9cd048862d8443 (encrypted)
Stealth Address
ee43732cea78b9b9e7c7135ed604574fd117649803a6b25528898cee9c1e8f66
Commitment
6035e35ae74df2cee5a7cf5652ef0b4ad8796733211559454eb3e57dfe615e78
Range Proof
672 bytes (Bulletproof)
Memo
679c53fdda98efe23cb1f6c2efa70d14a5c23ed830224538c0622742501c4bdec2e4db590a359b7d8ac7b67eb6e9d42cad3e582b352ff9c40a7ed04ed413a25af6a98a8db8d4df76b567ad217af895f4f504db54745f5435858be149cfcaa7c60bad9e71dd11958662bbbb8d0d67a0a013923a74184821190738993c1f050452 (encrypted)
Stealth Address
1ae4c7d45de6a70908d4b485026d96aac15b377ec9ce062e63b08cb1f5478f2b
Commitment
46286518114d065d90f449430a88cc095f8ee650c8b0bce670de6b09914d8f50
Range Proof
672 bytes (Bulletproof)
Memo
10069ee3a09f0b3759f1b2f2f0aed7342fab5715d3eb3a1a8df9784e2c98f38d5e11274736a2c2d30cd2d8223021e8fdcc0437a2abd6a63904713bd3851a35b503a159a002606b7d071000d7eaaf143b44d83e035182195fada6913b134a8cd39cef18ade9fb4a914a52cb22f38a11738c566ac52d0576fb20abb96aebccec85 (encrypted)