# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
26d72d45b167965e339895f33403c66fdabdfc817bc70a3822754f530314d11d
Pseudo Output
8e214815818f44378567a7553212b0ee25b815f1e57a0b23cbebd5aaa494d360
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
8e37d703a32006b945ddfce5f8a1812e49cf9673df061b0160090de359b5256d
Commitment
1e02d9f3bb51b694c531d4902b07d3c88118b0cb01164d163c10d0a00b008f22
Range Proof
672 bytes (Bulletproof)
Memo
bd7ff0044f8feb69f2f2d3a0f57f308944347a41a270bcd0e944ba4cfee73607cd835c46d102df429d2a5fb036105890cd29df823aa7e071b0824b8b6962201da62b2c485afbbaaac6ae70869008eda739c05cfdf7edf93d45c1bc64b148726ba2aa7481f9df1bfd739b1f4cd49ef742d419fe6ad2a262c2d2d31e2d3ada5105 (encrypted)
Stealth Address
5cb68dffc302dc1428ac9072317640555938996796d64b14e7490f6f45dfd10c
Commitment
2a846955ac58a6c6f3cc2a13f610fbbddb9aea6379f52ed5f8cb2175c9c32343
Range Proof
672 bytes (Bulletproof)
Memo
e51ed8e3296a27910063e47a4162edf01862788f13682d1565f2cf6a89acaab79749b30a72f2398f7a16ba91f67f932a047ba5038e3d6ec2454f8a76f2ab475d1454b601ccb58826ff2570e6820ed524d90590efcea4a3802ce69484541452745bd061b38efca22d5851b938a1d6e495198646b92a75f4591f43336acfce8eb1 (encrypted)
Stealth Address
7c8713cd82476846f40e38e5e5db1903865defdc691f31f7bd716ce562848418
Commitment
68968eec936badeebfe3e1398c631a3c8f159543e3096f7ac7d8dc6f4f35aa32
Range Proof
672 bytes (Bulletproof)
Memo
987f555ced2b53cbaa35eeefe3abf5ca295881e2f05422b3ab13ae332222f2ba6a599af56655ee2121b751693c6bbf95bd7be0982ab61d34a32b6303ca3bad649a82946d4af9c5dbc3baf1d81b09d8008ef2a37204d857f7d756ee7a03a3b7318fd4abe4104d15eaa67d7c962ead983a77c23d984b6a4e07a09c2348cb958861 (encrypted)