# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
c05bee5ebbee1ba001e617abb81e5ae715f52e8a34f9de1ff9153643e7f3f12b
Pseudo Output
96d9547f00f04127ae88095c3ebdb3ec70e83389a2d436918e2db92e66ea0672
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
3a5504bb3c09cf49824ded36fa082075e07262426a51a0259d6b7c38c905e41f
Commitment
c0532e27114716d15fe4c72d5c2bc6e41770d3108cc564158aac6bc467a06311
Range Proof
672 bytes (Bulletproof)
Memo
1152ce9d05892e78ea32ec7623e39faf40152b2ca0b6d15947723bc9d3aaa2405605d112ba12b797e0db01088123a523c06597b72ee37e6872291be8638128d7d710aef43d23dfec046f1cb3e10fadb91d66703bfd6eea4d35dff0365c3690abd3c20bb096e2a783619c3240d1f00d2c2884f99009ab175dd6ea88f12c4e7ac9 (encrypted)
Stealth Address
c42babdd09293548bfff9f9bf27b83e7a3cd3e6fe37de3dd65c5e060d95b400d
Commitment
2e95ba49519cc328a8a08508b90d5a77aaa27564a091be7376e5161c79b5fa67
Range Proof
672 bytes (Bulletproof)
Memo
609866e08eb3afa5c670fd18237e4bcfee59d3013008c340600475519b0de8648a102b6c7a61b300ceb2df56cab0fe7e5a18dda400fde11e659a69414a17d0c30cb031fa39bf3c5e52c7c4e3a0203c64190e5de484bb15791080a8d61115f48648d07dbf7c9eba6907bb974cdf5e725463fa58cf830b1bb92c93558f9bc1a488 (encrypted)
Stealth Address
9866a87b91070a848168b9b586982b07fb4908411309f237740226435a2a0a20
Commitment
9cbb5dcd63164a474c412253f8a6385644fe6076a3b16b6a4e0cfaec98d25d23
Range Proof
672 bytes (Bulletproof)
Memo
c8179ee2b2c2392516a56882f8efa0ba25bc6612961cc0ee4dacc8c09505d1ebc63666bb3fb9a00a13231b8e4c5bc0141c124eb44a5f6c5792ec787bdff32cd3fdb3f083959a7785671d178fe908d46bbdb7499c55edb21114c24f2e66aa933a1b4a86dd8b28473f8119814679be008fdc0b19bac78fe809eac2f54d5176d141 (encrypted)