# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
d22fd6b89b6f0d4e1393f8257a26ea9cfaa33986682894bce7e1d34a9d27462b
Pseudo Output
a25370464d0a820fac4e491a237bbe5f5dd49836ff24a7792d8867e6985bdc06
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
5e387114fdfee30f4a91c2b07fb4adb726553848b7924d80902075dd66338444
Commitment
00e29eb28fc16975a3c3b61a4db800dd67baa57439c782495410626a83ce3124
Range Proof
672 bytes (Bulletproof)
Memo
7035f7a9e3cecdf84dd0db8f06ba05990e572c31376ca10a5dfc8d5aa3e9ec5a7b26ce21a7a3df7b75a463b9d99d8c16ff0114a8c5c39cd061436d5d6e9ba636ba67db5dab61be8dedec6fd3800b5b475f4c6968f20c074b232c4b9e68413bf6c0b8c3882a9a07016a80fdd54ba7ccac06e93b79c5d91f5bc0d984303884faad (encrypted)
Stealth Address
9087c7422c929db928a7102dc5a2d566aa58631190ef792586263859659bec78
Commitment
c8b5b9f26954cc8e8d70c08126dadfc70050e717f1839bc474cd00e880546247
Range Proof
672 bytes (Bulletproof)
Memo
8c9a1db238cd18b21be9ce30c85087dbc4f2250be0d378c708a5dae21ba8a0ca7700c8cab9575acf00eb61ce098a96fbcf31cb30748a79163bba75b7c640eef3d6937dbe87eb0e87d3c2eef09828745b693ac0e819236912468779d6e4d2d3ecdb4d413733ec315b0a9273d32e12e20d55d3f1b84bac5d4b06b44c93d55fb746 (encrypted)
Stealth Address
9831e8cf38541a6880d3764e9f96a5af9d8f46eaf8ed8d2f460d19e0d9dea32f
Commitment
4493ce5d1ee61d8e1a7ee74b82249ecfe47e12f1ce03ab95b3f4e6847d017421
Range Proof
672 bytes (Bulletproof)
Memo
5bc3c171403027acfdb164e19a8fcd7b1d5daf34b48d10864f6f7904b4e98e095e2091a8a70e23b87774872431f77d8b03dd32ee0f2ef6dc12c001718f8502d0c796d4b58e7fd7c7e01ce22929aa136866001650dfdab12c93d66c30e256438945c1fbdc543aa5bf9dbb465753d8699b3c58f214a9ccd11f3a15969b597b1abe (encrypted)