# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
1c68e11cb93d10f59507dfd011b68dffa1fdae69ca183817e6da037b625fc306
Pseudo Output
4028c39cc3a43f041e05c4c1552ac3eb62bf4f5501e9de5c07a414cfcfa63c5d
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
1214cd472ba99e88705c7d25153add827a43ce2447c0e3d815a9b9c19d561c03
Commitment
f078a6fbae3388320a0712fc7fa174cba81bda6287bc0ba15d676d45f679ad34
Range Proof
672 bytes (Bulletproof)
Memo
100a2cbf08bf65995845d907ecf85a21b16897a0879b16ba81ae5b2f8689cf2c07b268d00bbb37221a03c5e8e7f975f1c6bf4b7df02f22c7bd3e7b9ab7633d7793f18e9ff35a922594c2bddbe8b0db88353ad9357e5d87f82470caf47f08925db8bb4909d4520d9ab0216e62845df7041fad503977f2046afe871717fb32bb03 (encrypted)
Stealth Address
bec875413654ad9b189e54c2ff1223a5843981feb0a7aa8dd5cb8ca57d454170
Commitment
d69f9287fa825f179b5336b85b3c21d774b041cbf2dd403906f1a9146d616563
Range Proof
672 bytes (Bulletproof)
Memo
c32b1041904f5b134a6c2f3f6459d79ddbbe29c6cba3e9ec9502d47858f158284f3aa7b7acf9c60f56c604b914df7707f1b5eac1627d57f4e818f864d2a4a49cb44e7b10f78f788b80b993808df172a370dfb1ca274237951c8f457662b3ed59be221ad179bce2ea7a25261305d0447aca60b1fe92da956470ef5243c6fbbf34 (encrypted)
Stealth Address
6c5e81c6a560df8756a647d03d6c8ae1f8ff363e2fd9078b89d2e339c5242f6e
Commitment
7a9de9f5f8ddf5a28d38aeacc093cb28196dbf73e646b3eda861661e61ff7f71
Range Proof
672 bytes (Bulletproof)
Memo
d3c4e7a70a12dd7623413e8af07be8de184e6c9e9e0ee10f4d2aaaf08d947aec97cb38347c070db0ae14e936c193d12f862770829563e21fe83972c481d5e9429868934e8bdc1507733e931c912de9990fb98ddeec3712ce99c02ac7c495c9984b5b79ec275a4c7a53185850bb998597a3d9f5a4c2ed12332915aeae1f4e8fc9 (encrypted)