# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
1c157fba829f4da79ec53ee6152d4756c6bfc2f1f105163838e7bae0b68a674e
Pseudo Output
c2b8a7239c1277a3c4e93fc303b2ea8bc2ee21a9e9e25ac5cd03d63e4f99eb23
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
8a30a9dea296d4589b4dd66f65ee0cd0439657aa10cb4c0d928671de93ddb847
Commitment
feb9820fc64bf9c4480b1846ca04ae4f96f6f02d66437892c5f0eb6e65683f1b
Range Proof
672 bytes (Bulletproof)
Memo
ecca15162a4c062d83a3349691f568a97f98a6d630aa2c5a303dbaaec2460c27aea94e7be383ad04e1df6996cfd3c1862d1f71d78c5756d412cbc65fe8601e3e951d62044c01c5455da0a007ddac591594cdbbfa95db1e912e0b1ea62055412a9e1940905dd3e59b77a08eced0cd914859f5cc417c0be175d4a13119c511afc4 (encrypted)
Stealth Address
8e978405d73d58f714e631946119a471c347e9637a25101329226636acafd70a
Commitment
7a156683c1c0352774267fb6df8507c1695c78b961ddf0f964c9b6e9a8c13b62
Range Proof
672 bytes (Bulletproof)
Memo
5daa83e1a0b59ec4229bfac7e7f1afb26142b0eb34dd810b2d7b4ae682e1426afa5e2edf8940bc0cdb769f2140e80a40083c51ad1409f71f1d239b37db8f3fd7919ce1782df5641e862610acef9a3e40bba1b962fda2c8a31440e7cdae016f68890dfab50fb0f7bd49738711e02da26373603e68afb06188fd85b50458a2cd47 (encrypted)
Stealth Address
8e439c63a0383649f4d5e11241df1d5f6561e6d3e64925f16e9203a94c62bc6c
Commitment
889114c069345980869fa5441aaf0583dd43bdfc785727b920e58fe2fed31b03
Range Proof
672 bytes (Bulletproof)
Memo
e6eb0578f9df3e321c7e0cfb960050dfa6c79417d4f7913700bdf813e94672975e9a3eda005d54362c098d12e05a0c2accafa9e353b0b6f5fc86b0062797aa3115d32456bbc3da77b66c67d5f4fc25d97babb57cb4e76a6965932b246fd1084c2583f4ec65cca02e905bb74a23786716e534e7a43068862e15836db1d0a9595d (encrypted)