# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
d0a5040e0962f9c0290e5d5cfbc5ad96d46a296b59f657a606fe0d8e1e3c3f43
Pseudo Output
1ef3535adc92e9e1ea4f86da1c5d8c990a6a07255fae7f544e7abbdfb6108d01
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
580304eddad257dd01778231a2064bf07fc36453490049fa7de403d4dbcbc825
Commitment
1c5a9b3ac3304bf46f7b7c4cd2184c571eb512c560d76c47007ac39e3c0e3c7a
Range Proof
672 bytes (Bulletproof)
Memo
67431d4ab9ec713b2308a6408a1c332c7854fa86576d6d2150f07d6d7f02bf9ad704fd963d37d8fd69f8b052756b6a1b09af1658572af5590384eb0e11423c71bf4fa14233aa0c456d53ab9e801359becdb39df7ce9c7155244a46e810c6e28d17e8685a85b7417cb4273d0afa801e821bceac3002b41a03b5413b1c5aa60c9b (encrypted)
Stealth Address
6eacdb06c494f858bcd483cf2a10f923da431e1a8fb9d0520e75146bb6a1cd06
Commitment
1603b075af8279be3fd38f431fd7ea6de371019755aa5352bb1e3cfb6b31ab11
Range Proof
672 bytes (Bulletproof)
Memo
be2371f01d4d3cb45368cf323ecb02398f77a133dcfc4e967a19dde8507af4cb13ba03e849d4071e764e3dfa624bcf2c283c504f04579f1b9428cffee3b85ad9e5cdf51bbf2b2915e0fd06df95d5fefeb4171679fb565c284ecd7e2d9f3623606cdc4885b8d368151ef2465ebad660c77662870f2cd7cb12c2b3482660036152 (encrypted)
Stealth Address
e83b42157507a1d2f84d48e607a50e13331a82ccb6e9ad87470e6221d8808b01
Commitment
6a7a29bd8d51e6cffaa5bbb85af76a77f4875a9e1d3dee06b900462582c03147
Range Proof
672 bytes (Bulletproof)
Memo
bee21cc0755a2e32feacf1ffe9a253af9aa5249503e65ba0f9af45454c4281cc37342755a11e8c8ab12be478b0e0965318ed9be52e39d9107305fbdd7f648ca790f32b3ae001a7d82312ea96552b3cbb3117add3e4c8284ceab5ccc6f11eceba1318b8bb67f1aacf184e3e4f6dbc46825f45746ce81b14730024199c561d74b8 (encrypted)