# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
eea52d814fe4a67db7237a1abfce5474743072f511ba3a41d80ec4e1e0fcf74b
Pseudo Output
eaec35920efc73ad4b37da7a03bb7f185f49e8dda1f6059f2e50011c09c7b37c
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
8ad0c5b2a977c16306af70e854991efca641eb9bc6739dfa4939b1e49a45502d
Commitment
386cff85d3586be89cc35c7a70fd02566bd5103c9218a55e8b35b91d17750567
Range Proof
672 bytes (Bulletproof)
Memo
3f2cba8f6c1a4b648dd0f883674e246a75c31fe896d11163f5647394c3d44b4ef486b4639fd5cfe5165cb69b5c1ee7e6fbac22397dd5f82bd95ba55fa266981ecf200ea4431b97d8dd54cf655c0da8d1fb3b85b2e1824727b127594d870c0b2a36cb2bc50342cb2a3d85b093ecf7489d10231bdce482120d3a39fee585bdb2e4 (encrypted)
Stealth Address
0cca837967eca4890a30e048302400f9f6977cfdf552ea0f19bb8d40c2ee893c
Commitment
de449857dcecfd4908bc9652d1ab263462c599e823fa750281fccae6749f634e
Range Proof
672 bytes (Bulletproof)
Memo
a56def285ac7650a2ac3f97830d8a05b52beb2d6347d869013b79b537c40ee5c406b0d23296beef1a8fed083f087b2d437822b58600a87ff56a6ddbe13578123d0179ece2485c366c38ea9e9176229a92c27bc25993cee1845f05eea38da90379653f3537563af8307f8e6b383e0522152fed36bf235a4ee7a88707dffff15e3 (encrypted)
Stealth Address
f4a7c9bcb4d77428a100d2ff5dd0a5c66563ced170ccd7f606178fc8b7c28d46
Commitment
9c93f2e61474adfe237f6446f57d9864c12d0549f675f9946a3cefb07923bc1a
Range Proof
672 bytes (Bulletproof)
Memo
6be8dd37bb556440bada1243eaf83fa9a98b8a69c3f1b0bb928e200865467123679e45c429abe7446c4be6cd5068264e6a7596327129f59a4cbe4a36f86ee254d0ad9ea93e1c038f935cc1decb7d5c6eb1cbbd7a0311c78bf29394d5780058706b22333cbd7aca890616736a9b72dbe290f43dc76769fe84c16bf6280dc941fa (encrypted)