# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
92d926ee49401854d9519a01cbd8c54f122357fa2a3999e35104318af475f121
Pseudo Output
42a5d22c190dd5e8dd352413c67c0eb7fc9361625b878807af4aa0419e4fd553
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
98ab17db9796ec09c5696d912799771e8d750b1630713c6e51d21c269b0e6078
Commitment
402a5bf825bc772c4a979789aefa1cee5d7a19da6d7fc09e41841725015d3111
Range Proof
672 bytes (Bulletproof)
Memo
436a3394499524363fc3f20a6ddfbfdb43e7511561936865beafcdf68e5a35687314565c6b64cbd12b22679d9926ab1de8d9c63ec4227173f6c55e00680dd6f4268aaa5b042fdf49ea2e02fbeeb70fc1697355bbaa8e6915b9baf85fcfd5b98b2350f8ef13c0e6d69d4eafd433ff1bb4a25461b7718d72690113e16bc283eb5e (encrypted)
Stealth Address
3477b693af57a0d69a9e4101dc58beafb016a242f972a0a604ae7834f86b8203
Commitment
bebd422592908fac2c44b4891c4789135405202744e0636bafa3b35c4d78201f
Range Proof
672 bytes (Bulletproof)
Memo
4ab3572a3d51f4fabcdaa3e3d8b28588cf6a35dbeafaf61f58b2ef8277b9a30343f0c4e228f9d98cff0081301310c4c54d4263763cf5b9306a2ff0cfd6dd35b983e45473223b931a583746c9e9e9f109cf3f0ebd9b3d40b667607c7bfe543ec622747931351505bdee7909c011cececea47668207ee84aed3b6c031758c640ae (encrypted)
Stealth Address
c01d9515af6198bdf6f0be8a7ea95327e4b71ff1e18713daec1c9d663b68de06
Commitment
32b7f337c1657c8bd3ccc8322152adaf4dc04e2b2c1358e70ee0c2ee13f20c3d
Range Proof
672 bytes (Bulletproof)
Memo
7b1b4fb0d72d09c055880a68594ee40043cd3dbdba7e262e44807992842d0866fc097b4116f79a69f0bee708879c16b3ed0e3e3e66c1d4e51d711e885386967b160e26dad626444c971b6a12eb0a3d3a279faa1357cdbbea21dcbaacd8eb09b25de6f1cd267446ec7f3e507b1b7565d9702352ee5d7ac2fef279e81c9acf5391 (encrypted)