# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
e2c5aaad41ec302cd23e57c164642b574aee8bdb7018449e576727a9c7306f37
Pseudo Output
324320251a4c5846e6008e16f64ac9bd216fea5d052f13d60957283de2cbdf76
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
8e7e7bc5352f94f903627419008f69e1c6d95e28dd97c4e5d5e9ed05b9c5c934
Commitment
8a28c3bb4bcf6e0cbaf1feced2bcbff81b65c5200e5efbe4e7db3b6ff7729329
Range Proof
672 bytes (Bulletproof)
Memo
4df8a39798da2f3178ea7a8e2272d37757c1fbb47376a2b67f023e34a404bf3d582beccd4d7b1821e69b1ad59a2920beecce601043549da30e50c2eb030f654fb754165db32ed3eecb8ef2a1936cd4e0004005d3ce488b7627de4648d93ae580a2807b43123a0341fd6a93dc9b4aa04bbfad867d77986f7d24eaef85469240fd (encrypted)
Stealth Address
c8c867577c0bc5657a3827ada7d7f0ab57daaa57b2b47be6ae31fcdcb6b44d3d
Commitment
60ff81ce09c0d36e2c15b215b38a15768d45387e5e1d42bcb6b6310724846714
Range Proof
672 bytes (Bulletproof)
Memo
6bd1f1dfcfddd1174e8ba3356c78c3dde433d3bc738bf0fc009c5ef0bd258a7673946dff279b0ad1634e32ba268053273839eed290094e89ee28f0233d5496dce5629f45069a5cbbb623752ac399e86c54ebe775ec39a8a0b4f45d993bc6a0e27793a09f13dd1a0ff82228309281625eab258343353333c1843c76c8e82bf877 (encrypted)
Stealth Address
24ab4e9713ac617d83be201f1894f4544e1bab30f2fd446a895bb8bf19186e69
Commitment
0cc1b36f60cc455e5bf48e38c5ae0cdf690b749f1fd17c8b639579c623384375
Range Proof
672 bytes (Bulletproof)
Memo
af8f77e91bb030bdf059e2efb35f33804afd7c07e3b85850a1d763517dff8eccd1d70f37e61c89b70c24cb2a5ce0ed9aa62c4ff07ba66859b5cb4021387545c102e4f98d9276e231f87177e7feb1b8090aaa8284ae5cc20501a07cb6373867dd0e627745ea4fd65b7d8f08b984ede4f570cecddee9bc50a207e8773f67437bbd (encrypted)