# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
c22e85d7c0e6ab4845f4ac0b187bb964e507635ddaff6169532ae4cb38788204
Pseudo Output
40c82d49fc6626c2eba184cf08337c1efe7d30cf6eca53b2f13d490f21450731
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
74536983cbd2afa515f0e9b5df670b85413a123694dce35352e9202e7c5a3e04
Commitment
5878ba593fd054efdff74ea547db8f74752366a70bc79834a3f800b83e60f526
Range Proof
672 bytes (Bulletproof)
Memo
155e74d687b0d59841dc1c0fb025395100e17d4020412398280f12303e1f7e0103b2b0bd120ef83506d061baae3da71c4b18f3cdca8dd7740b6b5849da976bc87d44d3dcf19cb0ea7487ddf802e43dcab6d992f682a5962f3ef2baa6386d518bdf14145c3a354aef74b7275e1af6feff8a6afd0eb03151c2edd73830e294e6e1 (encrypted)
Stealth Address
dc691f7d8c12660edd0220eb01d42ffab9615944ceb36edb4f072edc9fabf576
Commitment
e80aaa7a8f3f6874958daeeb421a70db52d520bd5bbd133975a27ab93bfd6371
Range Proof
672 bytes (Bulletproof)
Memo
bf4e4a4219f7e9d5305662cae52c74b13c0d6e6d6114f5d14c5212be18a8e083c1c8dbd8177d6117650652466389dffcea7fa0fad986e16dcf9fe239f6e394f622bdd35fdc9e83bb0a0686761a51fa51aec9000d2ace7938c053eea203d67edc05cc906332472c569484a416622a0de85cc31531dfee93e247438df66dee2403 (encrypted)
Stealth Address
90df5f3f2aab40da4bd6d643c2150e1a8bed36db39594e483d50f9e30c907162
Commitment
cc760a25ecb9d912705bfb180cc809881fba2f56ffe221cf1178861e94679b1f
Range Proof
672 bytes (Bulletproof)
Memo
03c5d12b0d218ad2d4914a64f290f6b8aa18835523410315fda37650aad2470635c66619e8f424e726a254e383a1bab305236961729988b56bcf282905fb41e7c2940fa75e20644e0bb38d491bf7f59c1ae0443aa0fbdba8726709c486086711746299afa8114a16369c96b2288ff510b3cb363ea42d9eed80f1cded85404634 (encrypted)