# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
fe3e29a987aaf850045bfde5a647a7741106d8d46eb8e5c0ddbe0632756a8a3f
Pseudo Output
888cbb6c07c83f02b3d0e7aa26fb36982222a3c97d1c64010c1f1cedc7ebff10
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
14a33573045717b67f0c75cfe456b8f275794cb3f58c7c2848cc6755d744025b
Commitment
ce25c127c3edfea9fdc4016e70dbbf836cc7aa7de512060138a51fdeca5d4350
Range Proof
672 bytes (Bulletproof)
Memo
d614771e2c7a2e57826a3efed0ea8280b432e6202064b48b39fac6fe7f8a8f7dc26f127f1b8d4502792afa30d4d73797c679d375a642bd12ff50d12b5b4798155900bf5a6023e21e1c5ab1bd725b7b18349db7ba9fa3477c0f5c10f184a6852b4edcd7ce7efb144767d3caaee5349e80135371ae83ca6191f7c1a9c09595c2db (encrypted)
Stealth Address
f43313592948c856a3a5714ff326e9811b526e189ee8dabe7020d57df11e2077
Commitment
c8ec0352f22f1e132a5f3e575974c578196ec637f6f537762227a967144b0168
Range Proof
672 bytes (Bulletproof)
Memo
7f1aa8769ca1ca8638f1c939d6f515cdbcd02056867428db70fb2e3a058eeeb7589afdff1a12897501dc92ee7fd1c17799c19c38895d722abed7a3e003c67187475fe39cce645a421c95b85f842a08dc94c881b0f9f0a0ece69b65bb296518d8a7c67fed47c6a11e3208242bf014e5695ccd854a9ce906a717d00312c495356a (encrypted)
Stealth Address
72e1066d67737e92b55aff72d0c0c0c3e651d7b9c68c97caab778da78e77df7f
Commitment
84e059d9ef63477b3171f0ff33cf9a1cc446a57cac8d9e75701edba76998f210
Range Proof
672 bytes (Bulletproof)
Memo
e03881fd51db44648dbf6b263995f43366ea6c8e2b5aec1bc10263c8bafc06bff554b3afe28509a347113cda5bed356acf3aa960356fe43acd61f3444e6e7b3fc568fca04f910a68fbbff978aa2820e09930c06f4ba87cc6fb901354c794eaf3ecfa2121596b5499861e1606f389ca75b28cb63edc02932a3e0f97115488202b (encrypted)