# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
bc9525d4b7c8c1fa7f49c5257fe1afc2f4becc01bf397bc7b8d54b9a330a801d
Pseudo Output
6e59b5c4ebd47cc8f8863c1b3075ed7ce0a77d01eba42da93becacdfdf9d0723
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
2a90b43dfc80b36c834e4690dd0af9002a8ca1c474342377138a30e91ad1330c
Commitment
1210290c6530a110a5b727e4d033f96ba228abcb11c3e1005f3ddae7a55d1312
Range Proof
672 bytes (Bulletproof)
Memo
1d8fd4cf6d619ea11fb39d4f34aecb2e13f7ec73f4109721a9bf7f8cedff104ed8c11e633e203831859d10425e2e388bb717db8876456f347554acdaa7382e1c1c73db89d6e2b5fe5cb6790b6aa1c1b25c7462f183c06ef15cb76d6b7c54932a5aba83a54a73749c86a49431b7351d5b6298c581f764dcb8948be6bce6054745 (encrypted)
Stealth Address
ce20ea05a6cb28631c70a5c01ef3e39169ab54df5fae6a92245793a99a3e6233
Commitment
d6c11acdf295cbf9861e6bfcf9b0bb9d963bb4087fac62d706fa736f6eabb64b
Range Proof
672 bytes (Bulletproof)
Memo
ba65837ce800d33a1b4a74a41ddac550582afd67498e3d06c4d299a416dea18699bfa8550cbf0b04ed167b0b1492c4872fa4556c3bc6a99b287bcc15a45ee30c1238c4e8775ed7a386c0a3eca98ee9a55b8648c1234007e14f33b690f7841252a82d14e76a6d9d65d22c3e55e61da13d2a2a0f07ac3bb3d61f39e56d5d59705d (encrypted)
Stealth Address
d6bf487da61ea16f99528d3284ff26f7673e2ff3f2b2b7fe962594da636b593b
Commitment
16c2c71941f99ec09d92ca2534cf002bdffb941ceeca2947edffc1e41554ec37
Range Proof
672 bytes (Bulletproof)
Memo
7d08c77eb29640bc3d3d7df921a60d17ba929a3be89abfddbcfa2a27357b29338239e14220b5446b0db5b33808729c2e39ed61cefd7c7a039962ec12f0f3540a9e664f89cbd0057ff52ae39bdb2ec472e47c631248691d8ed936a6f763c7c6677707c44d2cd7ee6e11fe0a48cc7e9a631f34e89ecdde63f81089adbe5b83afde (encrypted)