# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
e48a81063ea256408c458787f266742bc8abf732a4bb73177058d596a0ca6272
Pseudo Output
0e25a494aec341ab20ebf728d3dc225727c21fe90375f5ec32aea60a3c5c684b
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
00d96a8b8825c0f46698e953e5ecf2cc54428f1aa7ca76bdc5927397923e3a2c
Commitment
9ede031efd7dea0137e595b225ddb1355b56e388ad50260dad30ddaf08f6f542
Range Proof
672 bytes (Bulletproof)
Memo
8570eab30cbe73327dcd85261906a73172b43310a7fa6e9739038977732ad7254a790f27c5a89ca54a15069bdf3a7326414242b436e8b54bcfa45f854841819a8d7df69a50068a2003788129f397e40b6fa7ec11346a46035fc8f10fd6b0df9397ab29ef15d8576ae223c3048c1839bc8e4ab6b1a285dfa48fc55094f2dbcba8 (encrypted)
Stealth Address
8823f82c48e8d30156ab1cd8b2d618005219420cf69e5cb758d03314ded60713
Commitment
9ebe421753a9ef60fdad49155648f8d78789ab8ac3150ef89763c15289aad921
Range Proof
672 bytes (Bulletproof)
Memo
42c5eae1983eaf00829b779c8eb5710ad154e80b4c95e7eada088dd263a2839422d66a2289d97e8ab8d31b052fd2786829c6141c1ab46169195d1897fef8f8718e140097ea5feba97a6e8d77110edbd390a0a700ab002fcad70fc283f88e3971c87c91722799756ec34c2f159e416b7163953200c9167746276047f4e48f9606 (encrypted)
Stealth Address
20ea1199a07f0b10a744274eab34885d3fc9e25e9b2d41cacac7c918e0c1b10a
Commitment
3c2280007a00e2ef50684a1d3a06208be1ea162959ed71924a58516a4ef1f64b
Range Proof
672 bytes (Bulletproof)
Memo
0ad8e3c5b2caead7b8d8944140900f2b699a16b5f3c5588ec16174d9ad0afb5759902b0eef2a63bc170512e9f7a3ded00e0916ff0985d47b908feaa2d73de371a01422dc7d2ee3bb45bd8e8eadb98feee10f04dd92a009b36a67e9f8634847bf16860f6b6497f913bac6288aae4454652121df30f09dfae5349763126a7c2d5a (encrypted)