# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
9c90fffbe1db50ab4b9e310d01b51bccfba8348af6099588f3bfa87ad6db5573
Pseudo Output
884a58498881ab9bf37a2650bce1d70a04935225227c6a3348b48f91e421791f
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
f0e0ee826c7f16f83b8db4cbd13135b90a3b3e86728cc7817ec138c655807851
Commitment
9c2b880d74bdc8d883d25b6fae3262aff69e4b27cc06acdca47663b299d52f32
Range Proof
672 bytes (Bulletproof)
Memo
07b1b61c4b7393359a5f0eee9bbe75728fbb7effe155694ed72603e45809c70c7732e2434af2bb9189e5aedb6dab8fad4bfb00d5746a87b6cee187516103674fa5a6fc09a4555d044770101fe3c2cb858269d53a5aca289db9d97aa9f3f7b25f2b1bffd007d84f527cd32a5455a8ac87896b7f23acfd373f0a5f0eff768c7dfb (encrypted)
Stealth Address
32f598ea79834ab18e7400846999cf86d5dfebe5351c3ec4a625c764af7e6300
Commitment
661c93e56fdf6539c4614e244433eafcd9a1f076a9c850dde24d12cb08a87532
Range Proof
672 bytes (Bulletproof)
Memo
04e683b7bfaad33c9ff335b3547a00741a224a12839d13ef4daa4cc3c6a6885d3e4ca388a8f791109c96e76cb83db1b3320d2b8935ce2ffb61de4787157f1d3f8c07e2c1604e81bcf137962890ce16c092bc4a7510c06cc4ed7708b3968ee7c18a64976e5e2516f057084c83899f7b53b15e916cb01918f217fbb93f7cfad8e1 (encrypted)
Stealth Address
b2862791531dd47e6d14e8f4c299072beed456c21c76367261b484224c70f221
Commitment
b40fcadaf4ac5b47c33781aa147a6b19fbbe82c66e2f1846ecd64969e176bd74
Range Proof
672 bytes (Bulletproof)
Memo
d7d5323674ee38a4ac8883b9374ab9b1f4a1d3389d80c1b8f9a5a79fcd0eecb37d4f87f2022ae92ea982c990cc1ef9504aae2afe3cb8ac9c7774970c43bf76bc2452d774bea17ef7167981bd238801cd59cae39fc2ff1946cfbce6702da2f02956ce7cfdd78e6e3afc8675eb75f39e36a46e05c941500ed55bd0f1d0759cc697 (encrypted)