# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
a8aefccb718cd97e37eafb0a0fc5bee4c7a1efa67e2eb44d2d754edc6794db42
Pseudo Output
d8c298513acce61b499e2bf05460e238b0a90734b078e3edb0bc72f9aa30e27f
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
ce5f5ed487e4dd911272cd027be014a76b23666d59ffada661a6509ef9473a01
Commitment
948b0bcc237f6336783f7e72967f44fc8f54127a2da10457fc8cd69a51961569
Range Proof
672 bytes (Bulletproof)
Memo
443a3806ed9c8ba40b771573678031fcece269230ff66fc55f9fb16b6359500dc5d13f95bb46b85a92651a8f37411ff26508c49ce14cabdf8c1758f9e74750f5ea237f27053a4cc466c326524f4045fb93e3c50110cdc57687649ab2a6be7bb7ff9bd68fd9b675c9b5777fd6a64fb493e7525dc8223f426d0704eae88765849f (encrypted)
Stealth Address
9a1f2838b7c61de328d58f01378af4e140bc1f801bb2aa264704d8ee2a0c2c4d
Commitment
94d5f7c427ecd833b8aade5cf6c232d72c757b6ecf2edfa997ab6b99b6b71431
Range Proof
672 bytes (Bulletproof)
Memo
347348c86ef4e4874cf10d2fcc0abf2dbdef70db56dad5579c1c035443b08f050e0c309ad3a2ad9a1fa0ee27882517756e2bcca2909813f030f8886e5caab7f2adf376a4dff2b3964a812c425b1e5edac95e656e66c737b73e786f0c2586dd2f34b1a8a692f9a2bb783019cf49d85ac18c8d84aba65730dfdfc25857f1323119 (encrypted)
Stealth Address
d4f12e47afc3840174e684f3b1bb9f28b1440859c915b8265646f563fadee35e
Commitment
e814d770edcc5304f64693f31f1fe68f3c893f396a53b23879b2065c10fb2564
Range Proof
672 bytes (Bulletproof)
Memo
971046daf58c2be6a8ad5e02e89163ed93085b551a9e5d69cafd962c23a593db6ba5023af309ed89f7af5a19ec9fdc4e52026c333b3b03a5ce9a8cde7335074f9b38f26cb608840935a3f528f04cf0dff88161d3db1a8f4b5389895840579e48c81b64fc520e16f708b4b668aee4ce3d4f5640d07ba6ea13ee352da13b827d80 (encrypted)