# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
4e278a65a1ed8cb568c49398b3557137a86fa719e7be90dbad606c5f24b3ee71
Pseudo Output
fa7646bf4757d1c7ebe8a5314de9ecce6e189999d9f4e85e1c89f767defe9470
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
a080a83d2994ccfeacacbf505bf2416af918005b154cd71525ca294bf45bf206
Commitment
b09de4ce73315fb9e634b5bcc5e0eaf9313475181065da918eb652bcea92b003
Range Proof
672 bytes (Bulletproof)
Memo
51fb351b31ca9a96c33dd041d474897e78ecde58b0f1500c1513d37ac5434ad9aa24f5d08294bf7268665e4e450c946de869182c7ab51a8e1409dec78e93e41f11f21d19bb5b2aa836ca8fd4a1237ef6719a3f38cb9b11a2b56f32cd5ac5d05dbbc6bbd70c14b0bf33fd074c544bfa6c93ea24dbd58da37dfcde3db40325801c (encrypted)
Stealth Address
b2109baafa5f6f2ad2ecd11ac850d9c9a75da620b4e6cdf49762940cc1e5570f
Commitment
ee1511a4ae169f7d1ad0eea15fb35aa2fc90eaa919ac6b3429daa5d56b36ec1e
Range Proof
672 bytes (Bulletproof)
Memo
8d3620d14497718fe55ed709a20c3be17260f26ab8859db1217df17035a5f08b78f1beb5e8f4fada182a0d03813689b11328bd279b4579446f9dbb331f450d45753040cab593984bdeebc08b6db0e38339e65503b3cee8dcf743f2a17ff4ef7d455b34e562d9c0abd1cdd8c7b7248a0df86465f3b84b3279847715a2d103c8d5 (encrypted)
Stealth Address
96727d4f0a61ed81910cfe168994dbacefcbd72a54812f548aa579e0895e8416
Commitment
746ae8afde8971ba329965cd2fc35e6e581ae6184a5130faa3ab78ba5846b17d
Range Proof
672 bytes (Bulletproof)
Memo
a26c7187bfc59bd07f20a4550233b046f29a53f1e691f7eb19c681642e2d5b0633a3f4334547f700e3b396e1bbafb9d1c4d727e4ef26cfc209e9c759fd1be172b7ca3ae9ad585e6b96c6c27eae74c61897bdc34fc42451c5ffe2eaa8213efab6257769ee96956b2891327220751f33811f53446ccf73b36b596cc398c026195e (encrypted)