# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
aeabe07d4b9925a7febc545ab3c377e7b6971485acb06c0b0a0982279cdc4d44
Pseudo Output
d010ea5f50efa17fec63bda9f8866478873a3353f6e6cb7705b0bd3d03dce945
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
8c74726e1a88b8f7bc9099f22a8af92620a42e7f9c5889e74280d75554b72369
Commitment
000d80acf3746fb02a192ca7762dfe6167505ba3da2ba2ffde187b1a863add3d
Range Proof
672 bytes (Bulletproof)
Memo
2a5b3306661750a19abbba9abab7f17300cbbb27711550a4afa4aa89ae2a72eacb76f0da39c0ea93a7fcfcdfe0d3ca0df20b697b071606db5cef52f219fb3a570cf4860438248b2bb0f616d965747ad3dd6ea32d647dad081b8f775d5909c52abd205506c11a394d37cbfd2147979a53edd096ce185429859dd56769e0f592b5 (encrypted)
Stealth Address
300769288a9a3e18514d0498e7e61c6156742a6246e53ae62dc414676483202e
Commitment
1e51b59fadb26a456bd143f4f4d6f3a43b7b22bee4b09a0ac011039ccde80c4e
Range Proof
672 bytes (Bulletproof)
Memo
811eb0b4a007d106f46b2f1d7070c0278b79d1053994ff9f8c80bfb73a0bbd3f19b3bf1c57aefe3857b83f7a244b76bb523e3015157ae5fa241c7110e6e3709c6bf67db528b556f7c039b9a8cea5bfffb38d7420aeea0f0c80f5c84055b285c9b511786b2e092c715f8f9a9b659ef1d18e43241e241503466f3937aaba25f734 (encrypted)
Stealth Address
1e48586894b410daabcaecfac56623d69cd6031e72ee518dd42caf368169013a
Commitment
30b7f286060d3053caee662b407dc38f91cfa92260d1d99ff37a1dfcc807ba72
Range Proof
672 bytes (Bulletproof)
Memo
6d9e70943a338ec3fd631f77f06e3ae3dff62fe39001086292098578ecd30e1cd42f53426e046d298a88b7d55dfef98287969607d410154a3e7024772d92291ddbae921c1da96792b48ac1d7384b84a6e0fc5adff1302ff49126bf5e5de2385cfe8697e7b3edc35947a438db554eb0f8151a9b47866f1dc04e1bc302ffce8d03 (encrypted)