# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
d0a050a4ca3d9282e3efbce2436c68b17fabdfad1147eb4c511362e91d3f8c5b
Pseudo Output
de368a6ca77df478380192325a918e79a0ef5499cb5c871c35cc589f79688077
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
366c9bbd442bb1d4bfd105f3393d7e302f611d5f7623d08a8e3eb77f634cec53
Commitment
deceb758c85987d8678b41e6778acfe7359230d0ca029b40344d1ef4d6210513
Range Proof
672 bytes (Bulletproof)
Memo
4807db475baa7a491825d3b139a6249f13526cae7ca9879f92ce82a8b100022b1e779b599123d62bf653cef822d33a7ca616dfa833570b3b5b4b51301bc746ce2a370cd19d3691831e1bf19105ee6f8142a6f246f82538f283ba61f1ff023f1009972be03cf5db2f6e58709929d3152e349004428ea68df9f8d6eb908fbdc442 (encrypted)
Stealth Address
7ef4d1f668e0b170a290742eda6432943f5a131c16adaee0d5a7d2b015f68a7d
Commitment
78e449cb930673e4894d5a9000d25f56a4d5ca04bb678f72ca24cd9b3d321761
Range Proof
672 bytes (Bulletproof)
Memo
b9391471be13184da5b4c32ab816647082a72f58f0c609224e7cbbb0d1f715904d19366ab323fce7d454c06b239c6b264da169929365044226599bbdd46108a5437a07a5c46349a03f99b2f1f4cab9fde8409e6e359ed9dc0064def6cc6a0a959aaf21098cc2798d56d0947d5749acd645b73b79705472673441df06cb8dcfec (encrypted)
Stealth Address
1a18dcfd8a2d70ae4a16666df82654483e382f8376295e4acb721048f4d6753c
Commitment
c20bf67c35fa0faa7f82f1293d3b2b43c6f8e4506d56025168ec2cf61d30f47c
Range Proof
672 bytes (Bulletproof)
Memo
aa02fe3acdb5298eedcd3b5d81862f483ae1f0b7954eb10470b395e6e0b928948c27067e1630ee44e27b8809c5e5498d4e345f62699203777a3841ffc31c87554afa92c0f05cde2232642b77ac13a61d83183cd8ee45acb20b8f92d3a4bd35a83d3895ad29130d77f24d1345861d47b7d508900b79fd24a809f7c2bd3d0f0e15 (encrypted)