# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
1e24425406f65ef2435a3787cf690b77464a7aad03f63c3457c2ecab40bf0031
Pseudo Output
f8fe065d28023746adc12099ed45e35797e1bbb305e5d072a5ba1dbbc3b87d33
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
e687e8931ed96e67210ef5021c63a9393954cf5993a4649bfc647e93d576d37f
Commitment
de30072ae0571e67b9256527c7421bd230dff524a152384b6da488b8d3ff356e
Range Proof
672 bytes (Bulletproof)
Memo
68a13c80d71d6e4982a8d84ccc8833618c958819afe87e5c65c5a2822e286ee6f00e8b80e8f560dc1a2c7fab3ccdf02aba733d8ed8f197b8a194338704db128c91e3f4462449c4e6d61e7ce004cfa96c589238e1eefbb9d6dc9626e839d1e68c074683dbf643132983bc75e1c77eb72241ef5f189f60e58ad2a8347f57729fba (encrypted)
Stealth Address
06b1f96301bbf73e11a8bf7396aba55b49832a3ade28592155db0b82359dc544
Commitment
3a86ba365df0e69e49509a1c73f5578c858b960435c2eda797abd7ced1dbef47
Range Proof
672 bytes (Bulletproof)
Memo
b56e4a08c57c33d6150d1e54a380a5d878a2cdcf46c074e5bafe04c988c26dcb90548a4240e1dd9c8880587f9df545c3d4f0d667117909b6f89a8aeee27750e9c671ff3327c970b17eb37b500843c1d06597b02e74fd3c62d8393b87bd769cccd5fe3076ce7d0db1783a9220070b089534e6b545bb1b8b40fc6f9a68473e6f8a (encrypted)
Stealth Address
08280816b8d414affc3bad8a60d96fb80eb9867b7f8d53b40f0938ae93988373
Commitment
ae98a31e0cfe1212b8bd399cc5b10b29312e9eeb6df467070910bb1c44560e68
Range Proof
672 bytes (Bulletproof)
Memo
d5ea4634e6f99e15c809dea135de8021a230be52f8cd1452475c0c9f6ab08e98eef7c84e7ddef835ae815e9a6d5cacccf9e2705059d8c3c9d93cb74439b601389e0a8b6f775b9e0a02a682ff6413d58a4a3b6f68f20edcf281f6cd11c42b3901cff8c512ec873770f5ebd11975a721962a4631123ebfa048f6df83f44aa55c02 (encrypted)