# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
a6d3a0d4c7c4978f406e1cbe9f8af0b505c2bb6326100d79caf074222d08b017
Pseudo Output
bca126d037dbd750b62e042252e93da596fcad496d65cadf4bbf0510a523ed15
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
306b4cf9fd18d414b1ff1dc1af2893c3c53f17ff887c2394fb86e0aa6fe68f6e
Commitment
9440ae2bdc7b433a41a456be5f8cab2fad5e9f9c8c53393f3a5ff4a4da1cbe24
Range Proof
672 bytes (Bulletproof)
Memo
e96a4d5076f9f3ccc58658db5943dc0e73e19f57a564100b3e2086b6c1b44345297489a75a4658b183ee6d7d52a8de317ce6100c39cd77e3d45eae8912bdbbe4f108a819afc427612d195da4daa57e9db7595494ad078c0614a8451d537dcb73184c55e7580bff2adba208b969270219f9e26e412d56e403c4b8d14cbc2b2b36 (encrypted)
Stealth Address
5c3898663a96334443404ba6d44965c33719d64085d1f895aa979630dd8d946b
Commitment
e08b0ae1a02642d1e69f2f2ef954425e218ef19184af7bc77564320933487a26
Range Proof
672 bytes (Bulletproof)
Memo
36b49bf054129b9f9f66f52bd7e9bed20eec2e3a0ebfb2d0bfa5261fdbd25d334edc73f1983657f65db1eccd1baf396120486719d09ca380d760a227189704f4a7b956b6bef90786a4c8bd58589ae47c143ae0aa882189b466e0b0ca06ccc0b6763506b2db02dad57e2a94bd8caf787b016321aebe9dbaace5bcd5db407aa037 (encrypted)
Stealth Address
0055647a4e6f11ff329add85efa777c234c9373849253678747f18db792e5c1a
Commitment
784be07ac04cd1bd22c4ed3f773a513ec30767110852d757aed460f96f11712a
Range Proof
672 bytes (Bulletproof)
Memo
119aeb13628ebb3a450f5bbc461dc37fca006c4d4dad5bb007f3c5e943d8c0897f43f084ea200ad4f0a0c6e03874721c0515bbe90e2a2c4565cc07d49f2fd48809bbc7d5474290cf372162b0917b5a3f15c16fc3862c99fbbb3216ee70f45199590117e67cc0023896214e974e4106fd28c785f9dd9a6f3be9e0bf9d1f85237e (encrypted)