# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
a268c410fff25cd87f6ceceb843d5703785be6000c8bbcbd57a17c04a216c918
Pseudo Output
2a7fa932bda1ebf88564f6bf2db04189d29338a2d01a1dd14f65ca4443a0d448
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
4a8a2d7784f1e6fea48c666f7cc9a5fed038f2d06407b38b8e7c26ef45465863
Commitment
7a515d3dfcbf99d1c2cfc29ce4c558cfcabc6db779005607c317e4c27a749f2c
Range Proof
672 bytes (Bulletproof)
Memo
0c84c3825618a55779b83029fff998f2ae48f93d9d61f7ef252aacb3b1a69c14f25455cbe4a15cb510647dc486cc676a0259161800ee1f5668987fb633a3634de1ed468004a3a14b1555d9b3e59b6499e8e882a00f2f965daf5c1fac9e540c906cef5c5bfbe63654429708fa1f4c129cea3e04b13c2603b2f45173488d39882c (encrypted)
Stealth Address
14af67aaff53702c3d521294367b213ca16ca82123dd960f70ee8ff45ec40179
Commitment
482afc6111610a9519bb41e2d8f931c71440e0ed92c7e72f1a283e72c4967444
Range Proof
672 bytes (Bulletproof)
Memo
bf9bf6cb22ec456154369a608b3fa8dc5f67971bebe1a8f6a85dcc4d68ab6761a48dca2e3a2146a9e512aa83e9f1043a937f3c02c67ec0e62d9d336aa413ba3a6e0e14be2f7070135a8e596ff0500c45d527a8b2950728a253be5aec9dbbad7ff686274778c014532cec41d5db6598b5d9cdd927591ff4b1c4862426f094d95a (encrypted)
Stealth Address
ba748d6ff0758a82ff79a4525b371ddb510af1b22bb6228f57fab92b2ea3e95a
Commitment
0832279c952a94f057b9a52a18f8ad6eeeeefdeb702c42dec952662aff786633
Range Proof
672 bytes (Bulletproof)
Memo
3d7362975a5bdcb592f3ea68da2908662c0200a058fbe9005f6cc5c47cd09d8bb0f8d2b899f23ec6b02b89c54e71a8e643a0918028a3121f6acc2f34627a803ddf3dfc972a28a3fee3a61f6de04e3912cb78a91b94d5a9f5d89fbb8bd2b6f89111ada8a5b9215cc85d5fee1f72fe2f32de8d4873ff6694ed12cfbddc08d1c7a1 (encrypted)