# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
9a05371780695ba3d9c7e0b29fcc4127de867bf6241caf867bbae7a93d6b2419
Pseudo Output
100465eeba9cde3707eaa9040253e1ff8dddeeb6c4f715d4454e52a8d3b05e27
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
d224be1ca5f1b0537dd697fc068cd9025e9707cf35bea7df5869eabc8f02b238
Commitment
1289e9bba97c1c4cf17b345b2ef45624a1cb30f7d2c4df00961cfbb658d1166d
Range Proof
672 bytes (Bulletproof)
Memo
0f0eda12aa34c4713b5b2fc5660cc93177b4e9d773e30182937dea3a81430fe518229db384497e46e59c634b93eccd0a8a8c6140ba5d9389075d99bb788949c975f0ea0d6268b9abee4c5bd18295df4a45ec618379558da6ba851c8e5909cf84cbfdd44a1be52ac3d53631ec6edffd09299c35c19cee729c1573d82871071450 (encrypted)
Stealth Address
f2f19268a51c5825b5b7d1aa1394e623b62c7ad3f21f64915888e8b4d53c590f
Commitment
34e2ac10423586afa4e85f8e8bc357ced09d3eb24b73ec2dc95017dd4bee4e24
Range Proof
672 bytes (Bulletproof)
Memo
2f36fae66b6fc7e8a7bd8ef8002d86d227218aa18b5c2731c4895a79a34df128153415695c869da2c906ed6a476ebe5ec136a15bfdcc523fb7f0c70c938c09737071795021589404b0453b18bbb98e5beccaa9d5d85e38fcb8b9e4b252410b2b17287b5de277319d65d83a1093fdc3937bb4dae00030405e4b81a9354090473b (encrypted)
Stealth Address
2a376cfee16802bfe7a97420225bf88f3cd15eb7619c3d423debb0c679bdcf44
Commitment
26108b725e0cf4a59ac8be904a4c9675df69305485aa34c6418fe02e55fa177a
Range Proof
672 bytes (Bulletproof)
Memo
394d1b7a587e04e869e98e78704f933ee506e73bef3bd783a5fd26dc37d37d03e072d3402d5ad636ea06c513bd59dc121ea99b209b52df95dceffb7a8079fec21719a4fdadb15e285014ff2c7c38fc001fb173c1abecfd20eb76b7ccb431c6539a49dab3306ef033144880cb628313a2ef52b4644576958a6a7bae36eb54291b (encrypted)