# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
d84a7b9af4dba9e8288fdb76790296af54c80de811007144b25d6cfa42da3204
Pseudo Output
f29531f6a9381c796af335051e819e70b9f4e7733624ed291194b0fab3c21945
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
d2847dfc814921cc318844b218e3b862c433376570b1d62ac60a28e147259868
Commitment
60336894c6e49f3dfea7b7b739322f5d2d16e0ffeaf7361c37e58a8284bd3277
Range Proof
672 bytes (Bulletproof)
Memo
a96ae410c7350facb3fb37132771859fd1567367b3f5679357f1519a58e71a647a7ea1472b9b8c892d1625d6252ee6074f0858a9b031d00c0fcec57c2cafbb616952822df53ec5d5a7fcd233514f2e782830592a8531851f6a649a4fb5ddc3d8c66892ed36c53ffdf8de1d71b34a9d744ac6b698f97c6af22ffd5368dba8353d (encrypted)
Stealth Address
487f79d219ede776b3d73d656748421fb732578a40fa3fd1b85147b27902c73b
Commitment
4c44f1ccb6ac12da16883d674a1ea92a6548ed553f0e3b101c0afd31f2830468
Range Proof
672 bytes (Bulletproof)
Memo
f22b039d09949061a1814359bb4fe55f1755090a2ddb6e2817d30f18117fbfa7774753b89635240741c20ea69fe3d47ad875d715c6ee40a9670d4f771403791b114a8ef449553bca4ad7447c87f628d0318509ab347379433594c4b98b226020550e427aceeaf9d7a7974ad58f2668db8f97a7813d2fb6a9d9647ae0510f28ee (encrypted)
Stealth Address
9405729dd4003d5d3cb4228310267c3f5447ec68d015029be661c1d0275dde35
Commitment
d4469ddb0a75f220a58e5ac525e74cc6be9ecf977fd896ddc9fb68d8981a2a56
Range Proof
672 bytes (Bulletproof)
Memo
e2f6927e2b569cd9fb1695e35920050ad34f2b1f485643a07f07638f786b0599ed09003f6bee16cfeb66bb64967b4e97381a6a622d5a134430b4e29f4ae0f10128650e91362bcca695daf9076eef460f6baf47b54be320ae5aff476a7011a14b7eee6040081f95de9e45b28ab5abedb2933ed37ac99fae1eb97d8d6edc556f03 (encrypted)