# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
987047d1cef33a84309d3960523aea11b5534c171538a21e36f4cb3fbb613626
Pseudo Output
0a3ead9e4c5e5d6454cac25b0e914b0e46ad71a6fee8716f6894ea3a1eaff976
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
f8d57f62cbb8c918e5e5802e316927249c55910859da03992d753064c39c8c72
Commitment
8c10e2d458cc6ca93785f84ffd74dd305062af33991a308f6ba84a76978c9913
Range Proof
672 bytes (Bulletproof)
Memo
f5e79c35e6a7c01b3ad8f9506b754e34ff97931810ed306c253e62e2774bdd231c9fe68ecda962b4763bd51d07e9ceae2f1e5b0deb381406f93d22c056391a3a8709933bc48e7eaaf29ea83516c5a2db235e7fc2e4045c7453d786c255cfcd4e2d1e161a2ab94094b723512bb882c30cc37b3cb0201f9b070448fde2d730222f (encrypted)
Stealth Address
963c16d4b422246a28d998b171bf3708c95974e608ec66815d0c48009f19e01d
Commitment
b21bb41bc4318c17bdac7e413c33b78b175617d656e50cd9c8c9e6bf8236310b
Range Proof
672 bytes (Bulletproof)
Memo
10f8671e095ee4e55a88a0b73b781685564610db629fedb0dd626d9eb04428bd830b04833719ca02dcce9b1957fd9ae1f9af4f78e41f5e5367a85f7a8c985d6ae87a516f8d0c636bbdbc1d830a63b4f76597dba5efecec6ab5ae2857934eeff5789db6d382cf00adb42fda86617bad2b19616579994ae17296f4c4cda8bb58b8 (encrypted)
Stealth Address
1c98dc8a055bc4873d82ec702e8a270024ab6a0c257a9ed85f66ec2b58921e57
Commitment
44f288e43370dedcd2dda355776bfdd50a9c977290bfcc23acb0237eeda25665
Range Proof
672 bytes (Bulletproof)
Memo
7267afa58d6488bf98faaaf3e6fef9392bbcac591dfa9847a780c90cfa32f00628dcdd4225044dd51ae5ff756afc82bbb07cd3b2de65197149b40c296716d3d7d43446ebc9ef1d6f6f6acf2e8194870675e53c6a3aea3363f0305717411e207c73a4efc320a5f9d71c3ff6773f8de5bfa348f2dd2ab5db045b8fc7374108d44c (encrypted)