# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
720a07f8febb9c356499a02ea00fd4c7a81da729e7b07c67ccf9f8c4c76cef53
Pseudo Output
0a021850a46ccd7ab5d8edf825cc7d43a28709d24d55a7154023b0976cd6c346
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
724d72584e43c2c1f6ac3c6e29e87a86e77a8ce0092b92fb4a509012eee64f26
Commitment
94978ba0276bb6260dcc6bf45e601df4ef6db732a4bdf05cb5d791da06821125
Range Proof
672 bytes (Bulletproof)
Memo
dcf95689ffa60db86d324f09f2e707937a4bad6d37a750e0fee067dab61c81cbecaf1c9a562d06c0946c4ad76adf77bbe631f3d473ad7e95c1bc5c0ad7779c3f54e0056900e07a01270799dfb7ad2d75fac252c606c3b0ccb66255035b45b53cef6e70e70fca626c5426abef50f7d3be8da491f38507c1b4d065f835ead75fd3 (encrypted)
Stealth Address
2803d64779339e81abb2581642ef9576b6cb855a325f12de1b4ce0e5869c0771
Commitment
b87acb70c0e05efc013d984f5e5d0618d177f16f5498dbf81f1e54aaf90f2b1b
Range Proof
672 bytes (Bulletproof)
Memo
5be79d53dca5a3930ea68c799aecb4afda90b9739c2044f7818f2431246e263d1b233cae4aa2aff51195bb3c8c9cfc63e3e4b05bbcd207e7b031bc9a3ffbb802bd83571b1aaa4e57f69269a83916b3595561d2f08d66711428c3a6a4cc9a3995a62af0984926760685fb818cc07e41167e6a91e94a436a7d3a9228e3a63b098b (encrypted)
Stealth Address
48b4619d52fd789e75b48824cad34915b67ba4531285d17f8b20384cfc819c3a
Commitment
72d6b06c46644d6e27ecd2ae9a20d5070ab320e9762a7add45e02c9b77e24b44
Range Proof
672 bytes (Bulletproof)
Memo
45335807c0796e18f0b523d771b02c4ff4357389995e43ffce9a57484c320a8ad2c7c92001f1e8b4188f3046f3516100949b0cba5e18c0f41445b19b914de479933aa07e1535c3435b09091bc3c03eafc2c3f7c6f8fdc31909fcdca781fcbe0806c8ef2db7277583dd76ebc73c2854506a43937414a04070cdf6c636e0559724 (encrypted)