# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
e01cf107cfa833cfc31c6d7a8660440f585392c6eb2df051f0ced12f2985e029
Pseudo Output
74275f862ab74221e664a9926e1bb632484cced847f00b8e84acb2ef3264d548
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
e08648b3146badd37d00396a3a3c789229e426bc15db6903dd22a19df9262137
Commitment
6a1fc021c74deb1f9bce9beca88254961c57ea424e99513ab8b360ef6642df76
Range Proof
672 bytes (Bulletproof)
Memo
9222f80921164d054bb5dd6c1e281bee6d2da54dd3a29f4e7c879c3433507f8143301c716020c31f869351032d01fd9baf8dfb5839c25c69bec381c2249a36dff31f0bd8edd2e2005981f04281f6e1af9786085527c151472c5f0dd86b4c3260328f6e08e08d109f6541f3da62fd49b61344930a586d84f6db079a7d058ba1b9 (encrypted)
Stealth Address
e438d95f72c3aafc77ddd1256a3e1fea6285cd2e9bc5a48130101bc3f9c39863
Commitment
b8da8861be6bbfeab68fa64b086888f2cd719c9249ade5821a6ecee0b1ca8003
Range Proof
672 bytes (Bulletproof)
Memo
3b0db343510487b7c53171fbb268d186f2e22b275a6186f89cdc9032dea0e990bf3c203092922e372e9ba2a1d49acacedde7d7554c427b8fc947a054238da5db339143e9843c7515e37aff5c51bca67ff2674153c4422d1c990634e9a04f9d91866e158e2ff8576189888522744ae5225df72501bba837eaa4783e8738b04269 (encrypted)
Stealth Address
46421184b172b4b4281b803bb0cf5b621bfef2195efd11a8661b7a0e7d51652c
Commitment
9ac94ed44787099ed8a1d8a935882a8adee69a617e9d67ad898a78c1dac5613e
Range Proof
672 bytes (Bulletproof)
Memo
72a3454a120c178a3fa9eb939710ccea1eeb278640107bd603a98e4a171622826b3114922f1e63d27c8d65b3770e3e0fcebadf75194ed0beb995d2951a06a02cff6efe69417bd5a19baa8022c94f09847801137ab7e98cedbf4d2bac062eaea9b8d58a763889bb2f484f7f18f50752dc688e10b6bd899e0ff0674e0041598917 (encrypted)