# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
6808be6a8ce5578ae703e0d6dc9633f2d76c08e0038d76367011dd7e8e650d7a
Pseudo Output
8ce210890b3b8822746c1c33546991e3c480d8fd61840a50a4a754463f9ce96d
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
ba1b4f8ef391b543a3ffc64553c711c6c922e9485cc45a04cfd4457d34294361
Commitment
00eab91d5bb9bad23805169fb024b013e797300c0309b1ebe08bb88c7095b007
Range Proof
672 bytes (Bulletproof)
Memo
9baa7212844d7e1801ea0ce64d971387af86afece5ff924a9c27d80c4b22ee9f2109a07cf8655cf5eabedde1da5e60f49a464e8592645f0fdfe0207b24795a691a6ab575042e0eee4f413d39ba66bfd838ba134a2e69009d3e365d620a5cfad63d9d74ad7d6be94b611dbce8c48bd25b7adaf021a575a354a48b9b422b7e0e4d (encrypted)
Stealth Address
2adb06b755a5ff76bacd079a5e9132b90d6ebd2192d43b66dc0fefc27561a537
Commitment
a680e593d6735ecf269a9262c8d549a5cc9947a9a70d52a785f328b22962e501
Range Proof
672 bytes (Bulletproof)
Memo
3c1214814bf4331afb6a75fe2482885e0553ff82fdee296ee68364103a2c8dd6d76a04b06d66e13ea781935c7c66a554622aba8487ab5b5f7f5023991fe6156e3cbe67199bd4184210e4720df062e5f8001c3be722a3b95af8b6f3c1675fdfefba20f75f9b53c89a474100729667418b5a5f84c3f9b232f47c55839441e7cfdf (encrypted)
Stealth Address
ec2dcaf4c3e6f9a536b064187e13f3e573eec15e45d879e85cc122a16670ea31
Commitment
027e602437161808749033fa4563f6afe5543a56bf8377191875885ae925f82f
Range Proof
672 bytes (Bulletproof)
Memo
55a9f12bffb209b7b4a6f5a8e011b845518fba484ef48aba2d228dcd3648327e38d4b2f4f22a6af0a70a87924802e557f72c4156999ec57b2bc31e1b7004527b57072554ff326b186af60db46dd5eee61a4cf20cdb6cb9e036e32952400619769b96f2f6975aa8dd37c6f2756db16dbe307961cd47582b901bc4d4789750bfe4 (encrypted)