# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
38b21973ed65e2706462e6268fe3fca90d8975d6038718d02790b34004d63b1e
Pseudo Output
303c25072daf7672cd8cc87251f52a5dca32112c8710fd9d4efa8d32f1b97809
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
7ad05fe93031f1073bcf9389e409b736bdcb53d7678205ac1e05195c80931134
Commitment
0489ceec1fc399c13787fd6fbe41ab8300be9e2cc213aa29b52127e062e59d3f
Range Proof
672 bytes (Bulletproof)
Memo
6e1a7872af803cda0c9f0640716ad51f13bffaf5f2e5609c7d4407b85a60c53ec395d371fcd74157537de8bb34fe0eea4529e8db35186b779fb919c27b970346ccdd81f20370eb32f852ef13618d5f2f137e09ed6f2b34af9fa0df83a2e2c18078c086d1f1a609169171bbdd6a9cccdb95ad9c1fd99359044af24253ccfa9dd9 (encrypted)
Stealth Address
64d763533c0dcf261948d2b99e0871c58f7807f36309f26f08f7b094b954881a
Commitment
6c9f964f7d1d13cdcf72dd7968699982b2f921c0829f615157d64e7cc3acad13
Range Proof
672 bytes (Bulletproof)
Memo
a0d61be6e64638d6181992d3f72a8224ffd289d18028bc88a9980200075b073b8eae6ee43ea5ccb09b7f9b0b0df4101ffe828c23fcec1e17ffa19dbd72121edc638b9b4a562ffd16b6398dd2b3e8f826bc9066a3c289481a06d839023951485305bed5e20dba50e2163da47096b3799055dde70c7819f7c38c7dfc5adf2860cd (encrypted)
Stealth Address
7ce488709caf444635f84fd93a46b3c857747acec5a7938653c1ebc2877e427e
Commitment
24c0c89a25379a7d85a6119bb96f86eff9dc6c37eb631e6d55daf858765e8e01
Range Proof
672 bytes (Bulletproof)
Memo
9db9027f371953b5812b462861e9d3a02c988386fe3cea4817fe8616251fd46f4e252ae0939acb361e25d19cbbd1291f845443c332b9f86fc2e84e7f40dc4935737ae2b9547a6a4ee120551b2ba44f8d983ec851c2eafb8161bbfd7f21f2e760a6a16bff6c15c7eb5875ed23b82deb5c00d03cb45a9bd19fbfcb219e6141866f (encrypted)