# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
4a04cb3e31b79d2eb197c868c13f2d0cf9251141f737f3c74d39255e59a4db21
Pseudo Output
94cabad93278589c4d77beff676a60c3596a4faed221a8ef47e4e6aadfc85567
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
883e999f4ab3dacc7ec5319982d56f2bc772ec2eeb762ce48030bd303dd3c72d
Commitment
dc9126cdd5f247193066ee18b2aa400ede5929845884f39c9126db473ecd9162
Range Proof
672 bytes (Bulletproof)
Memo
82ba10fbce610de35d11edaa27307a1e0241e1448f05302eb4e05b0a4c285194d9c50b450729a2f6b85daed4d06b15be2fb67fdb3418282682f8da63b9cdd98caafc1bf4005d02025459c9bbfe0b23a1d8e2fb9837a86935d4e73eb695e42543b8f83af6ff27b04a6ba0730abcb598d219bee4032397d0d69007ca9cf0a04918 (encrypted)
Stealth Address
a0a135b1f1a0eac9d16deb896ad2e3f79c9d40c0e806d6129706dd79ed59be50
Commitment
30f5386f490888f6bfad979965d98ff4daacb34b5232f847f71879f82fc39071
Range Proof
672 bytes (Bulletproof)
Memo
cd2f267fdd13fcb89badc4145ac24a9c618f652db0eb18212e69b07a895c63624800278b8f63c8af572d507eda61d46d38e9ac89ee6544de1a151a139088a84130faac6cf0ba2bc35aff94053beea83acffb494b40cbce0c406594e4eec2a86467027076924c061faac0b87422e8ff6f7df2c18360869234ae1dc92ec5fc228d (encrypted)
Stealth Address
40a2efd1a4f29aeff2e2da4551aad7f511dbeded4cc40620f08e33750cc20a60
Commitment
96123718fffbbd18cfaeb88cb94fdfb132413c52d370c5c235b43e7ee5957558
Range Proof
672 bytes (Bulletproof)
Memo
3b6a3b2114807bdd7c12688e84da1e78b639de395300a2e05695e1d1ca62e2e1b94d012c42a644d6c1259e82b47d758d94bd272641d37d6f586b9e0f9ca160f08c289308c8b1aa0fed38566a430e309bf47d303206a5a4c737191ff616fea0500fe4ba9ae7f3e23e3e119cd9776878f06b089943a22cce2e6f1c1e78322a1a5b (encrypted)