# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
7e17db10162d0c1b84df9e4b1ce3523e2a76c2c011c312a8c130af784e7c8600
Pseudo Output
5cf828b7d1984cfb58135d1ad7006e013fdec76d2c3ace2492ddded191be271a
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
08555d0b09b78373f8fb311ca4ed82de7bb7119d0880a24c30b62b86f44f6a2f
Commitment
e84a21415e3350b41d524e3eb554e45afa16f90c54ffb3586dddb783e12fec58
Range Proof
672 bytes (Bulletproof)
Memo
4484f513aa615a1bd8f2cab0e7f34c19b6c8b54cd4ff2e8e148c54524ef90d6dd723b2c96da4a2cf171ef62561835a626d848cf8ada421a1fe8594c83dfda4db618a75fe9fc74bb17198df3ea262abdb47e1feb964d928b727c933d43d59d034ec818588b48632dc74936aa3d44a1a6df33aa5d4fa4ea4908e04d3fa876597c1 (encrypted)
Stealth Address
ce9423f538e75fd2ed8eb1230b7725e31327af330768ba0870ba730e2a59d019
Commitment
2c841b08d5761f30d5d23fb62fffe6721564310135db692ea724965889105937
Range Proof
672 bytes (Bulletproof)
Memo
77b43b11aa92c13d14358afe12907ed0d893bb75dc81c3a4a54bbf58fb68d2c7530fa1174841bcd44fbb0eec6723e09e954e0e30c61410ea50c50043d0a675449a8dcc99a0512f7084a56f4f77478255c2f0af950ccf016808c8533dfb04f5ba01860e6ceba4558f08abde4b0dc6b3769ae5b16c6b4ffb291fd940b893e10f1c (encrypted)
Stealth Address
404ddb2372cf7835fe347666d4b60585881f8d82b928fb740a799f55fd838d51
Commitment
7076ffedc3e71a884994af6658927368371fed6366d18076ea01c65419c29c2e
Range Proof
672 bytes (Bulletproof)
Memo
52158d73c6758b50e2de52965507c30667b6cdba6115616e17e61980adbefe0899aab923176223273b3ca3a86b0293607207532c6a79299b44d67e9a1e6aed7c4dbd308ef1385954e1f81b191d0dac5c3b97fa6fe7ed11f3354742732038400fd0f32028917825d1f5f5b7d5634fe2f5b4e81642ad8595a1a95c1a769a3bf24f (encrypted)