# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
987d8c0a246cb323d4880a2489530a239bb6c667e1efb547c06466dfca285201
Pseudo Output
a09050d6fc5f16526b4ac1bee8c836a37aeb39a34052c422b03ec019de03ad63
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
ded531e06fa9b0a2e5951e8de2e9a6984f45e54b7d96b4e51576b27561f6be40
Commitment
d42b36d30c57859835975d99de32cac7821574ef9c36191053fc202380df952d
Range Proof
672 bytes (Bulletproof)
Memo
8ea61759778dfb7582c11bde60438b7088f53e4181303b55fa097abeb5231ad2f7d3aa1f9c74aa10b0196f6dd763e0f32c039aee5b19b5402dc8c238b24fe4b50de5d26b91ed3fbd5e0a26dd147914c361c4c57b508986c72ef221d457474180b50e45e9dbe29e75f94a3b3fb7920a3a861522a4aaae35090379aa4401c8b943 (encrypted)
Stealth Address
187e3383574a14caedb55f4869400c46b6967be2d18b9032872b11c2a64c2a23
Commitment
56488a8b3af61da3c3af768e42663f98ba435f27a42365fa18777ad746efa46d
Range Proof
672 bytes (Bulletproof)
Memo
5ec2b2482803887ef038f5521f1935bc3bcd696f78e42d666174b51a8479e6eb07f0ac80001aaa0079c5523478f29a53d299c038c97ab852a82dc07d1a0822c350f4df402f7fd58721407b9b00db23da4f6029efeb0ce55311ee2d4bb657d7626f6bcaaedf7668cc6bf9dc7dab77190ec8bc7e4794eedb4f054be9b0ec517ded (encrypted)
Stealth Address
6e53300a63f52f34f96e03727983313e8bb2159de03720620ddee7e63455c85c
Commitment
22f5aa8b6e9862d0979e4068475d3725037a9f29e9a139762d3df2e49281792e
Range Proof
672 bytes (Bulletproof)
Memo
ff7f9c015b9c109e2f7ffbe515bf6821fdb4bcebfe1dba4dd400c824c61e2a7c5bd18253b463ade6bb7560719f1183cf91b9cb9f409fea79e65df20f71ed66ed8d8316cb4656e48d59c0de78c76e342c378abd8fef80da6149cbc5f8e7251b5e906b3296f0c6f417c17cfc3bbcbee404f3416f5506bbdd058f95ef7677416ed4 (encrypted)