# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
5aec1aca8967499ae55c46caf0552c6ba3b739fa214f2a6cd651e676d4d22d48
Pseudo Output
9639b93c82820b3c579c6193b57508718839adf41844c74fd82fb585e1aeb71c
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
8cada58d6b946d23a8d152ce39f09caad11dbc42ffd3f7b9a81c7216cb90824a
Commitment
10d4f770c8f216624a765fba3c690226d24f53e842058327207f00afb0fe7159
Range Proof
672 bytes (Bulletproof)
Memo
84e11d86b957fdb233018b3ea0da29a2de9a73f26ed2b631ba8a3a958b8c42f94b768c3ed0ff31a0829f874370d890a00b71afed937b9abdd9123c4a6b15e6fdd56375e0012f11c31cf3804b34af12055cac214d32357fa16cc29796c32552e9302935e07ffc5fd505ac62fc2d876047328cd2e68d596fd0270f915e563442ec (encrypted)
Stealth Address
b4c5f6639a43b0539385cef428b9a0e09c2bd630469e3b645c590dfba01ec62f
Commitment
ecfc157559b4f5fb3a6d5aa8aa96850bb3738933b28311338bbd4246fc249d2b
Range Proof
672 bytes (Bulletproof)
Memo
7ea7f6d2d82a66e252941dba7600366b4c7915474330aeb434a6dca4973ca7c760497515ea7625b39694eb0309ff287a03e2c4ce6ab9eff4cc823c1e94bdb77668ea289b091e6f6dbe23b778d2dc1ee6306d7cefc81ad4bb1a93febc0b5683e04a242058604e1a64a8d47eda5c35bde6c5dc24b4d8872b3b0fc9f4da2960ada7 (encrypted)
Stealth Address
54aef432962a06449f5de850164bace5de1b9288e0a600aa6de71649956ef745
Commitment
7cea15b249508878a8a9881c59b47294bbba77b4433859923400a67fb0f98522
Range Proof
672 bytes (Bulletproof)
Memo
e2f78d64eaa2dbab4b218219df220833c85ca5abbc253776f1f9f1d422107dacda3cff804a3e7d57a82d5a9db36705e26a8ab25281f4bb129ad3aa8fccdbb660372561d4c1007fa656345c49f4c4719c5c33a1b40163c3d2ef3e1030a52f7c1f7c7608e8252f7c462fcb26703818744ec98e7ebcceaf60b01e425be6e3af6f8a (encrypted)