# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
5e9212160d99bd5696a15d014afd54595f5e7309e101a1d3769eaf730b11572f
Pseudo Output
8af74f55757d0af17351ae78fe27af69c67fac8fccbdf16bdda811318a74697b
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
744f9fc32eedb0d12280a58d5dc13f889fdbf6eeec221fcf1ddf676213006b52
Commitment
d25162b5a4a99ba8a5d0787585ede0f60abfc91b7bc75a273dc910531639714b
Range Proof
672 bytes (Bulletproof)
Memo
86b4f7b6c960b618f4fa5f2a31eab85a462d265f559e156f9006c18d4db5e215c963fe1fecbd1512937e4ad43789a3c43513b4c1aff84330b7297da36d6c6cc551b50b9dbcce3adbd6efeb9a6922d1c2ad9e254acf25b22f3748c7c5112dd2a3144e1f47c2ca978658d63139a3922f4a5134011ac0083e09bec5f3dc84d19754 (encrypted)
Stealth Address
30bd9ce579297ac6c8df8f7a15cd21d1b808634000217d30450853330faebb1b
Commitment
8c041a9ffee2905faa3eba53c562d39af90ef6b02bb9aa997425ce2c1973c374
Range Proof
672 bytes (Bulletproof)
Memo
4f076962c9edf4a94b44bff3f6d0aa070b31bff9ee1a2bdcd66d7c4090a348630306383b27a861f9defb522edd4d574a72d39b004bb1f406de29c0c25f33e591156f548ae8768ca8d3dec0a60804e02febba4391474e0921cadac8930ba60e60040c16d7b597ac0ac2c7ccc1f75391dabb831d1ab7346aa5405fc20e64102883 (encrypted)
Stealth Address
d44b45a688f398949985c59f0049b8f935a68a83219ff12f089a150fc2a62d46
Commitment
cec38b2dc8cf00543b1b9ba86a9c182d26ce5135b2da7825137f7b03edbe5e36
Range Proof
672 bytes (Bulletproof)
Memo
64279f276d95bdc3a247d0b04474205da35eb7756ff38d23c405ecba6c8a0b18b787ecd7cdb47f00e835c9ae1995aa27e7f3bd1c0b02a8d6b5e6c9d213a8265b83b5ee6abdb4b1c450e9b7cbe70a174921de6294f8259be49a2e44295a18c5addde435323e62e75f350228f21db733022ea59d82f52ebb0fff2be7766869c836 (encrypted)