# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
425717ad480c3bcbb9135950d5d2e095fb00be83a71cece504f2a172d710e33c
Pseudo Output
0c77ccd9f2935d3b4eeeb3b3cdf74e55309fc0a04a5ab070b67a56b44b415874
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
0894cf83afb3892e546e31196456ab342cc41d3a994b6fdf55cc74b425e3b54c
Commitment
c6137b8ebecd5e6b5db7ab0c1bdc7f5ed628131f5a3694d5b24525ee21f73473
Range Proof
672 bytes (Bulletproof)
Memo
1be8583eca0347b313f0587c5c24620d009d775cb12dc7c39f4d9ef48b70cc82953b47f24facd1dbf1020a03812bb520dfb9bd754d5ed5db413de491ef6c7f79eb5d62740ac5f17e1f81fd290277e4c40c8c037239ec5988d2f895ebe81f9c836ad40cc9eb99e4ad472551a83218f82fb20d7686b1ba6b81d7fdf8e415dbf83e (encrypted)
Stealth Address
b47e79ac8d42316c84549b9ad806d7b9fdb66ecaa9a9b2551192738e8410066e
Commitment
88bf6bba6ecdadad0994618d61dedad496df9b79f5359c247be21879972fac2f
Range Proof
672 bytes (Bulletproof)
Memo
9cd9bf87b260cabb26ace13a6e2a723dee06367758ca1925d0d04476ec5d6e1693505dba5aa88d87ad78a01627431e7a2853910e999c4022c9024cca6ac4aeeb1af48702a513e2728ac2056f1a6af019a6696976bdfa68262f7c0cec5b21ce260abded4e465542f802ff79b0e7c5bbfcedbb90e5116aacc26a4fbac8dca0ed8f (encrypted)
Stealth Address
fc7fdeaa17620997e4c2399020600dc650c5c31dfd242eb34c4c0f4a203dbd45
Commitment
b8450dd4f1b8e218e9c418a5d678c5510b2fbaff0372092e41c4a08346f5000c
Range Proof
672 bytes (Bulletproof)
Memo
875051bebeaa187bbd3fd667eea9f23463d5f33f0018363998bb556fbe2ace94d8cafa32d25608de95ae09c1592c225634016afccc8b0af4311bacd1affdadc44c4d8d6a29d665673b973eb5558704b58ef7fbfe82c427e43ea91ede35e3c84acf1138f6677f2bd48b9c5d295ec2a4a4f8152e89d6731bca0959c72ff95d4268 (encrypted)