# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
fe3669a935e6ba078a74c21b572635793821ed3606b98dace2a01895bc815032
Pseudo Output
9c0d25c5a71507a5b62fcafa4cc30ceaf9e759adfa23747bc7f809739c7f505c
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
e815e4292c32ecdfb721db854096fc025c340bdeb218309497f5f2e8a3ec9273
Commitment
ca80056830c9b37797ad84e39e57fe6e6567670a93f3c255be0f3831dbf0134b
Range Proof
672 bytes (Bulletproof)
Memo
ab01a33c083091d07e17bfcb98c57e242582c2860511b76b4ed670ddf6b09e7ab95beaff5153e5700154a2852d8820616026a14a6ecb59f0d31899645c8ccfd71967973e403f598a716dd41a547a74b8d9aab31e248ff12326af98f021634e224fbc974e6815f707fe9041bde81f6dfc5c70fdd9a964b7eb113a2b7194eb0e9b (encrypted)
Stealth Address
9c6b97bf1cc190f797be76fee01fe1fa8b2a93d42da47b230772b224ce6a3d32
Commitment
c633a02688e820f768802e97c1e7a1c9ba556426ff808afc5fd51f85593b1810
Range Proof
672 bytes (Bulletproof)
Memo
aef7c8584c997949a0d899cb710676403ae036052175b9c6761321b46be84f0871a68afbb7e461c7206aaf4ad276c3daea28f32faf3b46a218fdc6e26c8b9c1119b7e26c7c0e63cf1fd49ea8c58756ad57ca7ee133f4667dcf3c9f922f63a7404f8bbb5c2530afdbe4f0e904382007783ecb1de77a6bc79816325e0952fee9cf (encrypted)
Stealth Address
6cd521ea6602fc83382983e55e1210ca95bb716e07af55837ff82f81b27b3436
Commitment
9aeddc1c866d6000c280834eb03b233f3a4569ec44f17ccc317c981e7cf6e76a
Range Proof
672 bytes (Bulletproof)
Memo
f41c30d13f55b53649352b95a4d73d58fb8785b0135b77db6bee4594b4b7505e5ebc0223d677070d67fffec0036e025bd25db0c35f0be643cbb5dea0a294c59241f1b3f206fe2eea97719bd0740174e2b7a48b5f028511f212965f076bd27129562bc07e73ee59554587d9bc4c69f1230791e2d2ddca24b423f9c858add26256 (encrypted)