# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
003e58f4cbbf3280a7fdc20fe7a94a75240ef5310729ae7c0c8854d38fc31f43
Pseudo Output
329b25a9b72d97d2cb36819defdd82c716ab52a749187571db7b8809a21ccd55
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
305dc7aabb6b8801d1d45bed71ee3c8b9cb000c1cd146b4d05626ed88905ef55
Commitment
aa6b1eb3f943f92e613599ad6637ed4284a26161fef857441c099ffc51473e57
Range Proof
672 bytes (Bulletproof)
Memo
e835c2d290aa2189e6d7c435ad135c70866c0f99c20899eae4cff839ab521a2e24525e584a72398ec4ebaf4eea15455e99ddf8292c3fc42ab23a92dba0864584506eaa83a484e37957444d076575a7dfb9117bc9202c4de8f24effb83e041a55a83497ba3b0c75dab6a9995aea08b2490e3600191802aaa5c90f80dc6f1cfc0b (encrypted)
Stealth Address
c0a7539ee39f38e767cd6c61ff6212a627c9d4828290644b97cc085e77f8651e
Commitment
0e79ff6cd61b635242c60f85907fc4c002c30a9fece0c28109366e80bf748d78
Range Proof
672 bytes (Bulletproof)
Memo
b040846069d5ddf43a416756a863d9827cc4f306ee64df4ae26b5221efc5202fd2be24c6bb5810e1d6094f740173b5590a4f73eafdadd59c8ad05559fc5ac70004f58b8a0da24915f99587279e6bcdc851c2246fb19d2d8d72e461a3df01b5f420cb0e6c46cb18dd00813a9bd50bea7e08738570fe398e5251ae430a01602da4 (encrypted)
Stealth Address
d4187b486aef58199461e80b2a0a579b513158547e1607e38144f69b4bb71b70
Commitment
b2bf1d1bcfe78bdfd559a5c7e56d518003f2ff716f29cce5ddc37bacca6a510d
Range Proof
672 bytes (Bulletproof)
Memo
386e6314705ea126097ac9cb5f8a042acb458e7650ed1c6d081bd771105cfdbf8d637ce50c212378e675e35908b80bae73c62a4501e4e09fa87d65219476920732426b446f9a52570fa96c4591a130fd3ea2930842d6bc63d0807d46e67199a80a624af5dc62a439d6efe29899ea1cfd10f967d38a6db37df4955c5b42ba40a3 (encrypted)