# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
f065eadfbaa8f78b59a7edef17a82daaf073b5587c5a7a6be2f0dca3e0a70304
Pseudo Output
28d660f3227dcd7b77ff7f986363c308bbe485b4a5c86f65d6bb87b7946a7671
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
d2eaa5fa98d01ab3dd177db2776f528490ca0a728af7b7cb01173335bf86d57d
Commitment
96d74e3cc8152442fb04ccd24fe3fb1524f005b541786dedf237c61559e5b667
Range Proof
672 bytes (Bulletproof)
Memo
b1fde32ab6efeee111a9e139ea0ac9b17fc279fd60df84b967e8c4b3b5b2b8c66e7496d7fb348bb048fd3ad1097bfa9c8e18a196916a7bf37bbe125d98546e1f7783efa426e9073f11999ad29d0ca27958d3295b9ca32f6d36bcbfbfe891fa7ecf98f043f52e12dbe317756fedbfab6ddeb2378c740186b5c817813a0049885a (encrypted)
Stealth Address
465e8a460a68b1e1ab9d4dac3b090360fcc0ab92c78493ce0c07ff3d44c7825a
Commitment
504d05bc6e46d461b56c81003bede80e14a2e35733a0a48ec65c360786dde752
Range Proof
672 bytes (Bulletproof)
Memo
843abcadce1912ff45410ed8e9f3ab11e40c51628120fcaaf1ee921de8a3bfcbb412ab14e53a58e32ddc77568d705746382227e6a4dfdf7adf0d8fef2132112dbe84ff660f0b2347ef2b44bb2de6aa2409ec038d0d5325c7edba75268036744ff5ca3b3ec5773f07ac062089feb4cf33af22c7e4c633dd4d549851a812adef46 (encrypted)
Stealth Address
d6d2544e3143833f10b80eef441d53a6a9759acc70397db0faef0aea5f85785a
Commitment
2a907e18ddd2cf171df3e222eee3303f63df04fb3bae09a84731e64354ab352f
Range Proof
672 bytes (Bulletproof)
Memo
425f76091adf11e940aa05aa01681291ee4a0076546a5a5a78f75503565ff33beb26ba01bd3ca80e398e321c4e9a115973a2c41d7eb20c71f860b3e6ab74f8eea3efbe26db6e709e4ea2c322cc10c21d8e3c993ceb61dc7cc5b2bd6e63275625f627f65cfe98af3f289fb0813c2befc1f252a32a99a29133859ea1331e40ed2d (encrypted)