# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
044d91efcc3110d1db3e9d42b83ce67085291e54d7234fa8d828dcce37c37a03
Pseudo Output
bce2b4d81d77ca65b76569a0f819648ba5a16d99028c5302422c0bf00dc95910
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
807812b91d5bd1b777949d3056e79a6c9a235979c8462cee642a28d32c7f6528
Commitment
362e762a7814434de4b00c2e2a481910258dc77315b82e04fa9ce152042f0b46
Range Proof
672 bytes (Bulletproof)
Memo
d9ca2e8ce762134959ac541d37390bc7eb8420816d877c9fa4f9e4ca62ce1837dccac9089b74a3ee0a4dbc5708eb5b03c274ef9aa8849779c975311da9dca5670daec340a07ee9c27d0b5065bc42a4386ab77b62bddf1d7552cff75148c43503e9ce59f2ec0c6450d956859c430d8c5ca5768f181d75f45417a4d301cbe99e00 (encrypted)
Stealth Address
f651ac0c703a088e044cc452f79428903d5ad058a33f05b2dc15bdbf50ed6a00
Commitment
ee50a7d8c00cff6b18dfacd1a1e970153fd0ea28a7ecbb152f76bda0c86ecc5f
Range Proof
672 bytes (Bulletproof)
Memo
a7cd7c2f96fd5d6c3dd265a6200ea5bf753d67f1c7d435911fd812f88a703a224db68e9fbed652c2245be6f3ebf39a334f29c0d85d58cb9c01c01d8ca7c18d629f9b87d9aed5dcc30c13af69ba389a6e9df0e37ba724df72678684f0dd898fec172bda332afea2d3d5f33bd3cb54daa613d08b0e66ab970f9bbd458e6a6227d0 (encrypted)
Stealth Address
c60d9148b305d7afeb8f2f345b51459e95c7dab23603c6f7dffc922a68b92762
Commitment
b452257c57524b64c46d1973c2263d5f234dd6148416836bbb66bc70a115766c
Range Proof
672 bytes (Bulletproof)
Memo
ec27af5abd701a177d05577647c2ff5b42938672334921acefa3a31667942d587311811c4075448d54a87d856d676e1a93ffcab5566dfb8fa312f972f3fad73a21fc13b46e421d3bd796a2663a5ee4a8f512b53ea84675f3a4dc5847afad77090974eb6fc360db42bcc23af6ef8e92004c359ce80369cab680fb76f0b8213928 (encrypted)