# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
4c1aca4b91ffc6847ec62bedaad81a0f8f9839c0e55eb49b2fb7b15af63a5842
Pseudo Output
40b1beb89e82745b421f14d980663ffab03b8737b684af75b5020fae2112987f
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
70a88ca1e5f6bafdd00397af4e7299c0c417bf9e1bda3cb3310b71578cbf8477
Commitment
988d15df27a557b33868c6868c0ac84ee3e3d359baff8af0c213d15220513b3e
Range Proof
672 bytes (Bulletproof)
Memo
dafc29c29d22a9f09d57f876e2f487b21d7076a8eaa021f2e8b3b52e7708270b42752e217e1e5f29d1ea5d05f696ea2514ccdc51dd742ae46d803344a27d4c4d0776ecd6d16719f620f1290b354591cfebd6284a5acfb06cb07b5eea808856f12f11b44fd2d41107ef94500e22b0a7be44a1259ff41eca48ec53ba2976adba0d (encrypted)
Stealth Address
90f664879bfc9b689d291971d3a76c26dd270f77a8b9f5f92ea00ee664232a1a
Commitment
3a52acdbb211bc4356f224655e197ae5ef206d43730db58ba5390cda1ed1fa08
Range Proof
672 bytes (Bulletproof)
Memo
5f7702ecbdc97ed4ba1706934cb252943ee4658a28ca264eb2c61eae2d36e28ea46b3e2105d35d7c8e7a85006cfbc26584f5257e72137122cfa9756d5a44732244f166ef6468b25d6b486ae86ffc49225624bddc2d68d4efca7fcc8c8066995b76978006a09d47fce095ff6917f655e99479cc9cda2d41a71023ae04a6a64d6a (encrypted)
Stealth Address
a2c20ef80bd7cc11563bd7b4c23836a23b6db2693bcf423a7ee82b3edf4fa766
Commitment
209ba5287f88900f47c5c4ba1a5c2d65a12c97881d53a7fbad3860483bcbe817
Range Proof
672 bytes (Bulletproof)
Memo
e03eea7c874ae0bccb044ffb81c3ec6b94311af9fcd606e67df7df5de2b1f75fe12461b976dcaad67fa0b61752f15280f9d20a6a6df33d371eeb610c7783d082c59ea6e409fe0669ffa84a255f50edf3959adf9618d840038f4168fe6706b6fad1708b9cb31cc8095498926c85fb3523190fee6d1da6286a3ac3ca0259bf02b8 (encrypted)