# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
98cd4b2901e1a384d62b73f5ae8e0c8de25e53710d56481d827fb298f12cf717
Pseudo Output
aa9ebdc27cda690da00bb069bbf4dd9993f3924f3e25af570b87f89fd8699179
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
5e52b2f0f2c4a2bbb9d2c3cd28ae62b95d995c8b2ad893373b0977d9501f370f
Commitment
e4147df4e771e603c40e633a729b65cceed466673e376669ca20857c103cc134
Range Proof
672 bytes (Bulletproof)
Memo
110858172ab38b1961ccc4324213c9cb7a38c5dbed339db987e220394491eade0f168df9bf1e10d75089578602f8b6854d242591bbae7ee2769c370415e776a6be35a8c621f54f00de725dd3bd181d24c3844fd8555e91bbcd9d4bfa8c8ae296bca084a7e3882957866fb47695df25f68150c14dcd9846fa536381889a045a29 (encrypted)
Stealth Address
4c47e2b14567b9603ef29e4c528fe1e9f0d0a2cb237cbe007b748a5ae542614d
Commitment
c0c4745bd02fecd52d144ac4c961030b936158f355546e3f8b0193f45b36f200
Range Proof
672 bytes (Bulletproof)
Memo
3d509d9ab3d164768b5ab47cac53c5018e800cf5631a9977990724ff2d5d8266fbd56d483fc1dda8c7551c550ad648f0de4ff1a52997c12fb0ca58145ef84e0a4cd9475a9ed70490ad420a6fc4084ed2510ddb11d221bf0784316460d745a401804b637ab700b6b5ed0f9c78d2652217d0a6fb00ebc711f0253701703ce1e36a (encrypted)
Stealth Address
c4f0fa6614cadbabf09e0eefb1fce51e3630e3e5ef35aa21deb243dc1bc29c33
Commitment
9abe16b19ae185d8ed851f1edc562584eeb13b732290b005293984a93fdb6015
Range Proof
672 bytes (Bulletproof)
Memo
1ac26b627110b725fa08a16af294a5403f86bafc78aeb66678f244ebc10d3ba6347170429dad55d5294f6e669783a394b5775335a41eb2b436d2b6182433036da131ee4251b2d4f432ddc7502003bcca2a76ee7e9d380adbe7afe8c9e106e155586dcb62a7e222cbdafa151cf1ecc75b745f4c03f4d5695489bb9362eefcee67 (encrypted)