# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
408a5aab6ac01d3b89863980283eb64033bef0729800b1cf17d8220d21a1cd2c
Pseudo Output
e0ac31a349c7fd38daa836c269b0dd3e19d551650067fb59de11ff1c8acc6d2d
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
ea2892e4425f2c1a237cec0dc08b0ef9066b26643a7618f6986ae6ed2d1a330d
Commitment
82b10b637347b9fc20b4eca44d9c5bbe446ae9973dc26bb013fbe6c1ee436e35
Range Proof
672 bytes (Bulletproof)
Memo
a08ecda6aee96eea70fc0adbcf7c194a177256888b26983f1cf0a08aeaca729099e518107208f6b354f81af6b1489c4ae5626c0605a1696e0fe118264e0f33e2ac999ade7a5578b5e1050d9ceea8b6bd8d00ef9bf867cdd6f5d55114f4e6a1bb2ec89c70bdcc1a2315877be521c4e84ee1427496385aaa9161631436a2ff8956 (encrypted)
Stealth Address
d893689023b70173e93211ddf21254bd93e13a73c14e794c1cc8eaf34ebe2c51
Commitment
d825640544790eceb41682e07fd3b83adba31f8bec0c1a7aac480f5064b59c6d
Range Proof
672 bytes (Bulletproof)
Memo
9b6dff4d849bb32364888a75c17b1938dd004a24f102fe16c93175a06b1145483a18a075c2d06630901932f5339151214dec298d725d05c78ccf11aaefafe70dde29b23e20a78ef4889832699b9fdfb178573cf42f7ec7422a0ef50b574ecbd368a819527a9cf762559c9dc8b337938d7c472fd90d2824d2901f82bf047f0062 (encrypted)
Stealth Address
de79d04274a8e38ce62f7c4d4e174c467e7808120b7d682f17bad94d36a1b948
Commitment
64b92f58b886967a1369a400663f3e58a954b27d8bd253a9c25adbcfbb286f70
Range Proof
672 bytes (Bulletproof)
Memo
061ead524e02762d7e24ba097d0238dc9ac1aec64772802459fa1c096a355e597510949f3406ff23c32a9c1b42cab4d677d8be944d6d5ffd1274d6c4471541588c26a2ba20a3c80618dd4697cf82de11a34873fdcedce5f7fda08ac01debcaa0595b82858d139c7a2a7f728f9f73bd0c36dc5dca127fc1ed16effd086e97da1c (encrypted)