# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
e46766264ad3b8a1b415a1fc4dc88d06ff84cfb0456b99a3d4ff2a3f6f3e523c
Pseudo Output
229dfade45d733933e125cc7f1ceb585435fe07881c92d1ef46559f1cdc0066a
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
9e9f1725940cccc5f775b429729c10a6535df7a151f4f6e4776539bbba35ea61
Commitment
72e2fd7a8655998141e6d21a0c83ed5ffc73c2e178eb14e93be6da09651dd927
Range Proof
672 bytes (Bulletproof)
Memo
19bd3099029f197989e73c369042476e4ee91f3fe00c5c514c77e917ec059f88b71f981d20d1e72da874cb9e956d1861adfd3bf08e81ce8cbfa51d5a7373c4b1c40d4f5ba99d960546d8d920e0acb5242c8171bc8485b512fab77a08d472fa0ed88072e9faf503ed10f728727224e5b665d35b6e9edebd58969f1d3f73c16120 (encrypted)
Stealth Address
f854fa328a8b819a5f506ea0dfeabf87a72e5419420a0777fb7c49d07aad6930
Commitment
642cd0c265e366bb1421cdbeeb3ebdd488bfcc5c88e727759726017cc647ec5c
Range Proof
672 bytes (Bulletproof)
Memo
2357f830492d5551060622223c18d2da6b4603c7f6e9222133fca7dcd594f09a40f014cab8cc0ec41caa1a74ecda9a4bc8b0385b3a1b526ef1a8712cd8a06fbd1a5dc67e98ee8f5f47b92f39f7deb19b2167bfb4bec8e676682d6e600265e8d70b62ae1361f62866d897a2cb4bb9d6bb264718ef398db95e83c34a81badde2d2 (encrypted)
Stealth Address
fae540285689cf2457fb61471a480d20f96258386f92e677cc69928a392fc90e
Commitment
76bbf88ca9e01b58437eda30c2e658522dd2f396985a3b2bb015bbcd0fabcf03
Range Proof
672 bytes (Bulletproof)
Memo
3f07e9bc311e37fbf4139dc26506fb4a28df02c22e3f80bb2a76eadff18e7324974084d06071de953587de66807720ab4ba89df5a908f63a2cdb374e03ea1ea8ad5631f785aef2f0de7688d4f6b5e1d084e01915fa87a09723d8f184764953d3becfef86531bad03d924830c7e5fb2db946cc1d263477f9e003f3decc2c2b623 (encrypted)