# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
eacfc9b2a1aabca1b0a5c7e964d123f09a6407a52837af8c1f962350f5d72b59
Pseudo Output
ec5d8f0a9219ad78e704bb3645056935f99a31aae887aefd378cc7374fa88d46
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
d8d64522d725120c1cef323fb4754fe6cccc5e4eb66cc2bca4279d47688fd43e
Commitment
8c24f5406b4e16f36d74ed67bd50776f2b249537edd51a9ed41c1e68d507e668
Range Proof
672 bytes (Bulletproof)
Memo
97c7e025cd4c1059e8def22febb23fc834550e42fbd5cd3463228c8ffe94a76a10e473547f1abc21d889399444c3d8a53cc44c12e5c30d7ac6c963329c08006ab05e05a8bb24e5137510db72b2d93283edbfa336a9ab15f30d5d522beae1a495856236f87b79cc95541530d855def8d4224fc185e2561164b776d7c00a20cfb8 (encrypted)
Stealth Address
58a01e775b0f21cf1a94f10d537802aeb5bca4622288030595f02c7b8c1c3953
Commitment
6ea2985713e1751a57dffd68e56d56a5deac57ba66da582fc8a18f0e12398d00
Range Proof
672 bytes (Bulletproof)
Memo
7fdbdad287ca207dc3c8be050104843c8d5aa2e92501ebb97ec030b98695df181a3b63408d74a40a00dacba8ebbdf9a744971facd44e29850a4d4627acaeff21f56c3f888fc4af1b5104d03e41ceba4522584912cd9ff5846d4730f7c2e57340315dfacbe00fd21b371d67b1ecf8c39b1bcb9f5ecbdefa2273b1001abae6fb8b (encrypted)
Stealth Address
3c3991ea3d0955463db80bd4ef421b8f892b62f513c85c8e399a2664db6ded41
Commitment
c6f7b687ec8a20b2c79f7cefd5d1e888ef6393efbf8113da75862f465a58b504
Range Proof
672 bytes (Bulletproof)
Memo
1417ea7a1635876c077110661d7102a1045dffb7c48dedef1e2fbb528b11777e6155dd0241f2318dc0d76f9365ed6fce165448b3ec3c0a564f7fb93b0da1cc4a1bcba7ae435b76973f8133a63bd9c0fc5f68db91a457334a23549e925c794e27faecf5a9ff2e12b1b65d5d23a074879683167963a627b8c1aaee85d7173fe034 (encrypted)