# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
f2cd71156cdc68f580d562c217bab459fdd8a8fb7b325f3e08da7a3a01c1f96d
Pseudo Output
585f83a86d2026161cd0d49406b04faf509eafd62b0d35484ea39ba36c547675
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
9015bc7f0c26f88ff61804a236c045d05492287ba8870e997ca925278f601d07
Commitment
9e5ad9a07d50d2dd86485557cb589a826fef6323ee95e6adc109626a28a7745c
Range Proof
672 bytes (Bulletproof)
Memo
d7902f4c5c9e96ec2409d51d58d323b97b1ab8f392d7ecd4c8dc076030da9d50133ae69bbf39073ae6b2e500f6e914fef8751dfc42b087d64a437ecbfd838e955e847817f022922b950d784a7722e0e5267f136641ba1a9ee036f3a360fd351e2bd93b4fb3bec71dcb75e22d530c5722e9fd392df397cb1c4866b64c56dccb0b (encrypted)
Stealth Address
e217ed7cb050994cc6a191d077aab651573e4eb7420c658e70c17fa2ec38df00
Commitment
1ab28f8bce50c6decf7d93b8ba3849bbfc4a4c2d3e62d9482066d8740d27226b
Range Proof
672 bytes (Bulletproof)
Memo
9ce396d8209753bfdf404325d7205777430fd5fdba7349c165cd7f5c9cd57446795e6552938547bf8d20bcfaeaf8baf4180f1a8c52c325a4bddc48ad3000763831102512fe410786c8a0edb9ebbe04c00e2b6f842f6b0b5da2d4fe14b55d128d6eb57e7e014f98ea530ac3c1ac9f6019ff97e2af6025d7aa2c0d21a84c194c90 (encrypted)
Stealth Address
4e05f703cbf8cd7101c60c5f5c854cf4d1633a73864912f433de21c95b6d7a0c
Commitment
e291f987e6b9f0c67a2a4a8775bd5f8a68da6d9831954e296e8e3cf1873b3151
Range Proof
672 bytes (Bulletproof)
Memo
21b313eb985555a11a45fd5ca329463547066ca460ca48eb60d32a681ac6e3818ca7de3a01f7aa6a7a24a14c5cc1fa36d7ab032292e2f7c3e3f225050a06bfd5015ef0c16906f548df2674da47c6f325550bc8016bfe9d6496b911cc824375d2fd655ebb3babdf7b245e4a67b6cb2bf7464678fd6f9db7763b3cb7c88ed1188b (encrypted)