# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
0a3a4e8113241bd010da285104cdbf325e9f32182190d1d0db073fe80f1fd624
Pseudo Output
982d329b7312f8461ace0a5e83ba58c48761bd332a8eaaee36d18cc78fbc955d
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
d04b3c6ed44b57570b049c6d5e0d2b1d53c8c534721790601cd794058ffa146c
Commitment
6467878ca39b65e103633f2770ed21b903592ea4076e14b33d4c10bb97e76056
Range Proof
672 bytes (Bulletproof)
Memo
8ff519c0939591865d4e94967a8632cd867ff3b66ffc4b535ca72e93e23d8085604e9380ea900bc0bb4711273e9c0d0e61571e6512cccc884a514778aa56efaf1b873ca52de4eb99f9f0786d39ebafee7da925244948df9b764f7ffac66d5504f363e77afb035bc74579840223a5a4d7feb785bfce066345cabd6bb275d1d6f5 (encrypted)
Stealth Address
f070469a5d2dd05e51cdbb2536f60f4c83223d4da6f4515c2e94befbf2be0004
Commitment
7e314b18078bb18be76a2a183ae44962c87d7a6807be7a11015ad772e0f80a55
Range Proof
672 bytes (Bulletproof)
Memo
73d49f63cf0b811a574357b425a166c438533f2f287ae5086ae0d413fb300fecc3b5040e4a0f44f9663fee1354d7ec566172a3cb6fa1e2c89f1d2bec1c424fa9a31d556c45a232aac0b933fb6be8564ceff4ad0dfe23794cd4e7f7446da7b8129da4ffd89226c1ce151a1d101adab66af0f278dc2982f2e99b654f3518b4f6b3 (encrypted)
Stealth Address
1a5958778e016a21b98e4c18f962cdc538ccdcf83ffd98ab247e3f9cbfc2273a
Commitment
4e750b23fa15af3e92c89aa2a69bbbef5dad0d9d938df717515496974f2bef27
Range Proof
672 bytes (Bulletproof)
Memo
7b43b918c186133588a1e5c22ba69f30d6c2425486c883a0f97fa5e838dba87c0dc355821b923bb366d4f9155411fadaccb39052b19ca16d5087b84861501289e22aef5f6668ead8a561b4ac8cca056c04248e9ab1c9e9eacb7172eea6f5598cef7c1f8d3ff479c0a21bf5640d50486f18aa2ac001c7991c6817f5bb7aba5eb1 (encrypted)