# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
0c18c73433b8cc67dec911ed0f8fb567b043d74332a1c66ef36f9242e7026202
Pseudo Output
0c35e378a1f1f1eb14f7a052fd02a5dafe3e42a387a26696eeda282cd831575d
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
baa5f6cc622813dfcabe51b54e993b550aa461d4e253e327bb229c53e198db59
Commitment
4ec14f8a93d5e288cf086b795613b5de7b2051e6ff8db06a95843fe63f153927
Range Proof
672 bytes (Bulletproof)
Memo
0939d4c1e03fa4a1b384e65770f795100b9cf7345ed6d35264288de081d9c132c97459f968995a91bb12d78b6f3cdae9a5e116dc7a7a44de3e22896ec07a6b0c1fcab9e6dc27b5a231e2303968a5ea04bfbebaded19c740b8741d21e726d182e6616e82fe4991a287924917f44252ddf06143faafa55b977f9fdb4604227ed6a (encrypted)
Stealth Address
0685650bb736ad553b213c8e7883a82b2a9b40d1584d7fdf07c12a0b032dbe1d
Commitment
7e7c599bc6e72159edd83749cc31824d40a040368b035efb05c4648198944440
Range Proof
672 bytes (Bulletproof)
Memo
041e51f6013670eeeee818de3062b0c5d71b0abc0b71be8c425b74c4959241791ae398f6ee0b3b20c592c5d7a23b9f0ae6af470a4fd1b60f9059a02f5d8870fab9b492a74b35746a1e90f0f2f1a21edbe887985d8b1d89acd1b1432f99158b7f0fd259dabba2f424c8684d0eb87b0ae67b0a8a4dfc0fffb5852bd7f2117881e3 (encrypted)
Stealth Address
c428c91373fa9449bbda5237214a9fcf5cff4e54cfff07e3533859544ebd892e
Commitment
4e316e452f85f5de9b3cf9b712565ed1828919c6cb34adaae5deae7342629468
Range Proof
672 bytes (Bulletproof)
Memo
ed2ef79ca1e5815e1f9ac56286a3c0b62bdaa896fa4cf52eae3c411cf0c2412941ff3a004911a2c345bd92efae334e0e347316646c7891e1335209589d93fd144c1f3a3be867d204ea748ba4e5b359cc256925d38dcd73a0ab6339dfd24cb8ef315c9fa1eb09bc2f00aa7a13f45dc9ab54822da7a14b25a0c8708562bd24c973 (encrypted)