# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
c60cdae1577d5e7daaa43ca9a4f378db92ffee92c395a562f6e32c0fe5fac37a
Pseudo Output
4a0d0f7b14304fdfa4338294fab8a06141e272db91c9500fa6dbb5b67b169665
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
9a03bd173a2e09ef890f3555f82467bfd10327df76a2e70e7335cd1b1d8d6a49
Commitment
b09fc6b48f5f0bfdd26f15b8680a38029a8fa1401dcfd1ff0d3084e814cc8b3e
Range Proof
672 bytes (Bulletproof)
Memo
8034e976be4351476d29d3aa39a2a8ac2dc481bf55f524002bd5ecbb49ee85a2ce75e0b8f0069e1a87e0a2eea58d6b9e4e0c62469d2a11660bc11ff140e970705c93525470eaa145d0c39b9998ac19b276df1576ef6bde44551e2b1cb21d9fe691afd77965da8e3cae6476b96958f87a370b1c02d86ceded766bc5f7c836c7e6 (encrypted)
Stealth Address
580c2fbd9ece0504d3de8e1b9feef22f1eec8325f1aad203e9397dc8bfc19d37
Commitment
3ee96f5f94c00b6b84a1893cce753d471b40d3dfb02996a70e2dc327aa3d305c
Range Proof
672 bytes (Bulletproof)
Memo
e324733a33e30a44d3988bf3de9f9e6cd827366f592eb9bd6845513af1af4c6581ef75c20a63a07b0c276270a96b1cef41d9bf7967961984819312b06806a61c4380a5076525687a6588674528a6c144100644a3fdaac6ab3bba64b0e2b0fc7e86f4b9a3fb37a671a6e32fb12147c8f247ac36dc172eda08ca7c1628700da783 (encrypted)
Stealth Address
a6e384909573edec9199c7de1aab30d5d09517794c1fe062da6c988ff7357f52
Commitment
0c3ec364a60de796e2788fc55eb05408decb32f5de6943efb7eac68c94daca4c
Range Proof
672 bytes (Bulletproof)
Memo
9c31e033fbab780862fe3774e74ce92581a15f6fcc7b64b54d11826fdb833c742e7fff7a396cac87e7f5502103c36871a2450764c0995ef06ab615a1990d032f5c1e7b85d07c581a868dfc003eb6ee9d649958d7e28ee2e07c3ee7e3b5dda80b0b1a11b983e6fae905f2f71844f03f81215a66b99e6cdf9cda160bb0ab400dba (encrypted)