# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
8e40fdc8ccfb4c3c603d50ff5669718904365bf608a4757f509254a76a730a71
Pseudo Output
56dd790d0ad1c96b22fc14db05b1f04182c6ccfd48d03cca6b6afc7c4752b447
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
ba2159355f2e52fc283360f227ba8da95c4d2c69094a81d934e663dda4f0d043
Commitment
08c806f22f10bb5f919fa1e44c7364404dac281ec397425fb1f0926adf6e6e0b
Range Proof
672 bytes (Bulletproof)
Memo
fb5491cba4e4661a0c4cd21bfb9d7fa6d7aa26e023caf46f60b44f144a64bdcc2e8d038b0d5b5f4a6f8eff2b0e63efac3bbceaa5e3fcae5ac31de24112a65a4b0be4b0de5440cafa6d1588fa0714997674bbe377e7e070eda973bb36a845ebc30f96d84a4288a167c9b39f66ec58ccf8ddc1c6cf6c0d00068a7e0d55dc21e5ec (encrypted)
Stealth Address
a0e8d60065820eaba8003f2c1ee4f258657d8972aef46cffd9f37865e8b57d07
Commitment
241329c9983f39ee53c84a37837678dec4f807000cde9273d06c05a7e1a4f707
Range Proof
672 bytes (Bulletproof)
Memo
6d89fb749ad6829c6b1b2e521b22dfddb6b7fdc395cfb8a5bd4903aa0f6408825263549fa04a24ccba642e8bb24b66222bf0719637c648799447af50a8e27a5e4ad368e6350cb411f27a62cf42e807a07f57750d3dfe75d2c55eb4c7851423d86c92563afde003bfcb28341b85b613b24dcd64a05c6db0a7212f58630706c238 (encrypted)
Stealth Address
ccdbc14a2df2ee90f0570a60eafa17055ce7e3fe4de15970bf9f6e9e68522250
Commitment
f20b1eac1246196b108427a5ea0032b892aae94494b2ef299383771079beda57
Range Proof
672 bytes (Bulletproof)
Memo
5f3790efec58c0399910918978284ff69e4dafc72d69f8200a3445bba1a2a274bfab1fd8d08268cd5a2149c0d8679c9a85ef7872a3f8849b30394125493e6586bfb904ef0efed559fc33614def430d9dc1b05822807f1d0b16db02aca95733781f8d97d69b02d1ff3deab777a49a87e05d35dc1a46857dc4b840904eac809190 (encrypted)