# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
9ec308b146c5da6379c457c0df131d6415c62b24bf4e7ebee31aa7e4cdc5072d
Pseudo Output
8c96fba34b989a0cb494fe817ab3002787cc2899a6cbb4ffc2e7261ee011a366
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
ce4c91ad6a14d5cf0dec1ce761f0640f4e7bcec5329d87db964d2887b89f8a49
Commitment
1af2e7254467d0ae2448369aedce8d5b1a86af585c99dec888ea1b21aaff4f14
Range Proof
672 bytes (Bulletproof)
Memo
616fb3e51f92c8756460cb4e7033cab31b594fb7c2a3e577c549b5c38b8b58ccffa7ad60cd34628c82276efe2d9dbe576e0005d275373ceee5fe0def716ee64312b84f797f27609b4f20d104241efcf4ae4332fd7c0dd36526ee12c70532cdee3ea383fe18a89f47a6554280ae53cbd6ace74a51c270f79447a59fa7633290f7 (encrypted)
Stealth Address
7e0ad8b69384ad6ee87ceaabd15b4a4e8fd067090c2d0cda403855f5dc940a70
Commitment
a67aa6c6cfed47df30d283756b96f474b46cf621520694a140c9b2f79c04ed1d
Range Proof
672 bytes (Bulletproof)
Memo
0b857ad9f3a79bb9be86f1dd4310aa21a0e13dde970be21583d593879230932b45d66cd00f359e8374d9349f36f8cf1e6f904256e0f147f2a3bbe08d7ce5733dc205b58585e006e5b2656aa0ed37a8b194ebc7850da39a7b98c0e189e2bdbca6a8de32a3d30b6424a40a6219e637b9ec05da3f15cc3c4633efcb8237a21e9945 (encrypted)
Stealth Address
7ed530e0a09459a70d50d611ccac0276c20dbd1e350779b34272dc4bc950db41
Commitment
ce742c1c2efcf6843fc0b62c8d0c2651e442563220469d37a781f6f9b36e4338
Range Proof
672 bytes (Bulletproof)
Memo
ee97973aa0739edcd25f31a74ed41f080504f16cb859f9f110518cc65350208cf187d9494b3cb3aa18a9475ac936d3e7375b990e78aff46af242e444514d7c217547bc374a5e3aa9939902678ec4f99abb2c01c87f14a78595c5e1461adc1b348b105820e1aab3c65c07e785a6186e596bd5656c312b32019a4667d8acd45ac0 (encrypted)