# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
1e5653f3553e2acdc6ba24bd030a244fef967a18d0a910d730a7d5baf1cdea6d
Pseudo Output
a626965cfb2f36c99411d696daf1f9e809a5aa0eb54d5c8d646d3caeb8cbca15
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
74d24bde7a98395535266168e3e7febeea53b84bc23da5d39659ab33f0269b11
Commitment
5c50e453be5a1eb8e32da450822521e1ed8b6c9d47a7b0c5df1c9b7adc48482d
Range Proof
672 bytes (Bulletproof)
Memo
dac6110f624381c399f1510da0bc183bc4ce6235b36b8b4b0639a47e0a249129968f53a1a013a348ebbdbc67a502af5d7f677ba26dc92285126b144d4f916ba055bcf4cbd5534e2c84ea7c1247c8a59437c153ebd520fd728ef253b2f4c70816398e8517ef59fedb0b35c7e2c3f9ebced7d4020e06ba2475017a5e8097e15d6b (encrypted)
Stealth Address
788e5259c9aea213242e49b737f8dda6d2754b788def777aecb8e32a977d933f
Commitment
f8081f9d97eb3949980be1f26154b97d04567297a7d672e489da5561ca48a565
Range Proof
672 bytes (Bulletproof)
Memo
69c0d5cf7816552497bfd45329b4ffd0e0d6cf0275f341d4b59c8d9a277541fd1ffd183385db4ae98ddba8e1b2625c51fa7c083d8724405775c3927ab3a84f243aa8a653946896b13229534ca0ac4d53700a11a971f3207706f47518a3f3319b5c2dbb2c2927bfbe6763782a5edc4c4c1070829714f2685782880bf2a86eb802 (encrypted)
Stealth Address
84718ec6647064ab12848eb4c49fe5441ad24afab56b0eaa6f34c60d25ac7949
Commitment
c49ed13537e7e573f818ed25a0ab3e0908898699b4cbd4e5d54248f568ce8b72
Range Proof
672 bytes (Bulletproof)
Memo
8c209c4b2bc4e6ea1954b04c07680b47a28b32e191769d1a448542d7636ae7ead3fe172aed98ac5fe44762387d4e5906621c693e1cdf88605f65d06c515dba8cbb237947a52301d5acb3c806b7f0168e98fc74919efdf1fa1e3e7b563f5e8d42c79e182e5faa3710df313f1055fd8095f49d8c873addc6621099b988784599b3 (encrypted)