# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
8c283db55657b038fc41dd23093d3234a2f121a11949725c0b8dce6cbadb9a30
Pseudo Output
70c9d0f34b2ac76e2ffc21d7328e6e2c25f0189f56eda29ba23dcca1fbf07209
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
509f53eff30125d22416b47c152efda41703c2947a0f0d1fa1bd0e3f64667a64
Commitment
fee63f4a8f501ff3074b9a835d621286703967dea5a2cdae738408f74cdb4749
Range Proof
672 bytes (Bulletproof)
Memo
0c727899858d2058bd0fedde44ba8398947eb4957a887685e249713be0ace543ca8b0a70598279105d4b68179782b8b8ee46c10c7c883c0f726d568b6646ace2c4a7759d2e056d6bd26b19232c999db9cf89a4666d8c7a439b62b89e3cd62a1098754123cf2e86f9112cb04b0be177ef67bd8823025fbc8f9e6a5c25d496f3e4 (encrypted)
Stealth Address
fcdf960097011568cba9f4381e24c7337009fa9333131fe17c15cc517e97c66d
Commitment
d092efafd8f4ad7e02e0d675877cbee10577245fd01e860dffac0765a0d6b72c
Range Proof
672 bytes (Bulletproof)
Memo
5e354e30397c372f6ea6410bd824f462cbe0ac9f6b9c25a1118b32ceeeee60cf98bede73f98ba5689ce2d67005e2a02bf9b23918b8072318b8c8de217c0050e144030daca8800f7c1946a25a80729e183eca8055bc7639dc585126289d520812bfe0dacab5df20ab7d4349206759559c691b06f0808bbc8755c3ff59857d4353 (encrypted)
Stealth Address
96b00c312cf3927cd5c678130c556c5093306f9625cbde5f5a99477131e19c03
Commitment
9a4aa6c6f3c81328233ac62511b7294afbfced691e804c93602a95960f69ce65
Range Proof
672 bytes (Bulletproof)
Memo
f880f29c79a49ff3cf933bf9f279e03b05ef53a6c090261d7658bcafd1c5fe04c8dec0db7020ce5da9bd18152c05c133f7751202999738025897fa05bcbda904c68ef638b94d6ea6ee3941e5903e05c904c00170ef5e1dfa2c7fd208d8b47ac65cb5737c69d4298e0d3815ec8a00bf1a204c2a1fb6315cdcc77d27ab460c5282 (encrypted)