# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
8e16451d03fa269ca2f8b833658121eadcb6ab2c593f72b4850df58c17440375
Pseudo Output
1ec16233f5c56005bdb15dd9baa6bb0365de7f82d1b28ac725ca0f76fbcb604b
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
02a78132275dd5c315e17c0b42a886ba148f406bf7ceb9161a19004f04815b01
Commitment
f8c6fae992123b1d982530a38599b77afa80c9deef9748315ccc7fa337b41f04
Range Proof
672 bytes (Bulletproof)
Memo
2ebcb1e64c6dd7f2b065881bc3c4a3df2d8edc4d88128d589e5022b6e1dd405ac0ad28a545060ba165a87f62b110a17cf0ed45bd6d94be7287aa9ec85c30f219f27e588b24546077c634508adaa6f5d41691945bc2063e78f18a72e5f6556befec8c708d07b2b3158775ce216a240f2566b73376f3cd23a74c058af1f7460c78 (encrypted)
Stealth Address
c4c40b5944ed5a48a919cfc01f8bfd40466e9ec17720e4c00796edd3cb31ef5a
Commitment
528f93720ff6a35f9dda0338aa287d3bc47a04156b4250be2f55190f3c56f713
Range Proof
672 bytes (Bulletproof)
Memo
e28732147bc5e7b0930d6356a15de642988ee4bccfd1402e9ced675c60bc1744673319aafdddb82cd7790eaa334b1a5d38d1babb8b4009b7518f9bc18cefc535897360eacf6ff770eace835a2ecd8687eff1a2ac9efbb60d2420d3d2fb5eabfb294b76a3413bd59668385b5611124a5d12057e977f4a23fb88610b2d06923bc3 (encrypted)
Stealth Address
3cdc2621daa8bafbaf50c323bf97e8adbd4eacf59cd6633b52725578af473202
Commitment
6c4be5497f04dfc15de44b02840cb517d71254791928a37ae78e7a28c2d39a62
Range Proof
672 bytes (Bulletproof)
Memo
c5cd6fda830e31b8abf58262e68c2cef9c68de51ba2b6a57375f76316af2a3045dee5df0f40d06990b80eaad6406f4807fd0d9a6fffda0740dbe3c0ee514afce55ac0ef4c1c70eb5fa64a6f345282d87ca32785f09d8ca747b6267a60d3c6e43472b32c54364b0ff717ed0741566be9b9741df2b0e775e46af7341dbf55fb78f (encrypted)