# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
5426e01844cd58b1e8fdc1ae8d0c88cc7c93183d13918f13a671668f93a7e947
Pseudo Output
da4c8cc5ce8119e5e4e2b816a4cdea3715dd9b463d916656066a063de8799205
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
7eef9c56147345357a79fa6bc6d0f515c2dc87284e89be4ded708c749eec1b0f
Commitment
b00326937d991d8a9a46dc0b1b20175e04deb6178b1221e78bed3dc7f5cdbe57
Range Proof
672 bytes (Bulletproof)
Memo
be6ae804f52fe4d7eec4cceca366f894e6e0b6e619f08172ce06cbd6940154900e4bd85221c762513bc01a5f16092e4e8c038426a656c970d718446ec8e9fae6514a21e10aafb330122503f585de0979c503d83140c550952fb2062f74a01de3ab3be033a3d80978a5afa58b10b2d8c5b12d69fb627be253f898f161a331c6b0 (encrypted)
Stealth Address
fa95260d05aa78df9e199e219ca74788cf889a5bb11f3bb306788ea3a11c0a60
Commitment
14af2950510ba50c01aad7172fafedd28ed0c71509b351f9de126d44e1a59c31
Range Proof
672 bytes (Bulletproof)
Memo
6eb5819bd597220595e2a60be964a8ea58e5359cec3ab666f96dcac27d1e532cdaad240010c99295cda5f8a58df7b3f5253fce15f578619d36189a5a90eb786dad6e572a4d7581f1037acc3868d32fdf576a541c31502243cf5e5713ec4698c1448c114559f061b4e60b136d7de5bdab4a2abfdc3727c20952f90ccf4256747a (encrypted)
Stealth Address
fe44596c1327f2923d931db284811c9ab3ce22910f467e59a2e227e68cda0d75
Commitment
4cdfc54dec04c77b92de4fa1db4dae0c1029c16240795df464c4d44911bd1548
Range Proof
672 bytes (Bulletproof)
Memo
0828108283c0dc05b4258dd27ddd81fffa76185796bb0e663d41a47285fef5ce0c5c7c004b22e607220206ad64df83fabc9a201f40bbeb117e926f41934250bb12986f29007ff9f896b1007d65a39029c2aab1bcff0e39f80c2a145b708620e38aacf71511b76d7deade4be270881c30649e052490ba2ead4bfc4f4f17e85a6d (encrypted)