# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
106d389d46b31dbf1dbfcf014761dabdb87432cbb1fef92bb25dfc84764a172e
Pseudo Output
be3b1a106cf4288db8e75b12c6487bff111b29e0bbdbfaf0503f1c099f6d253a
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
b839ce5345c661066c5b2989adce4262fe18c93f3f5692e7e5049b3c911b2337
Commitment
f4ba12d4f56f8c7f068532fadd20783ef202ba94adec05a6f3203fd918a44b01
Range Proof
672 bytes (Bulletproof)
Memo
9cea49a38f3282edbfccc95cb3ddb7965d18804d47a0c604810bd36d90065799731fc55f63e6350db1747d356e5ccbf0dc74f29e16c03f218db7cbd041ce9c38357c0d5597f846c5e0363c03ce66da1c42e43eeb904f5597c675a938bfdeb419ae233a213b38c68de524a384d361691ef94c67750acd0f39951c263cbefdcfa8 (encrypted)
Stealth Address
8e5ceeb5c01a79e9126a647947c5855d6aac84ec757e863449641917c3b94a04
Commitment
aa4b5bebb1154ed3550ad8f3994d303b6566b1e0beb07a2ebea8896c32e35510
Range Proof
672 bytes (Bulletproof)
Memo
82fe494659435db3aad0269b4f28d3bd4f44469414540f4a02477e9fcde5b09b9d0adf1f7b307fbc23ab23c4225c6423230bcb0bdc1706dbaf8b49f548659e46930369f5df4667997c8fcee63c628aa065fb9891e93382ee7bec7737babf648c9e9f115f4929ceb7a35448f0423b9adbf1e1b28fa16f4a7bc9ca92ce7236e5e3 (encrypted)
Stealth Address
8e61a109599aaf8a0e9de6dff7b187975690476adbd56cde138cff0eed281c5a
Commitment
f24df44dc69ac4ade5230685c11b443e73b1464f32d7205d3d378992c0114773
Range Proof
672 bytes (Bulletproof)
Memo
5a76a3dcebf01ff46032fc4ea4fd07e5e76c8e4b40dae04952d05a3071dde5c5df8631dfb03a7cc0046904b26773a68210094a95c1cbd66765de99679b7fd24c970ed6bb9f3a97b3f0e43239a0137aa346c92a90a9229181a28648c51830fa7177b09ff48f6ae7dfc9c6fb49aea43e2af42bfcc099a885ef645a44a4a79984c9 (encrypted)