# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
0ab272471f7e397a586a22212ab2caaf6fce5ee638dfe86ab3a1fa31a7085017
Pseudo Output
e8bc816f08fa53548e9e61f52a9b2a2140634f089f87c9dfbd47c10a3aa10c24
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
04260d6c8c10218188d9e060e331dfe2f5b7515a354845633691424f8b223351
Commitment
d2968939f01e21d32af092f1ea16c89f8f6095d92401f904a743ea237b721c7f
Range Proof
672 bytes (Bulletproof)
Memo
a7a29372c9e210452c89bf36acf886811a11edd557c59c87890cd9473f579aa224486622fb2529f42c0419bb7b127d9a73fdf17eac2ad1fce81ad45f92931e84d0a3a02c8cdbd7e3eef73378fbfa4ceb9f7e502032cc9e088426a2ed6d5a6bdf928ea689fe4871db5a81899a942f13d1503ee81040bf2edeec1df00fadf68c8e (encrypted)
Stealth Address
20c43c563956ba0a522a853a8881f5cc62aa7e6943246c5d416af58b68253373
Commitment
2080673259ea99fcb5d88557bf134e6a6140bfb9bacf148e77b738d5e3ce5b15
Range Proof
672 bytes (Bulletproof)
Memo
d0b45ce241330f36f7b63c4a05dbd270c3700746aca3a005a5f5c79cf34f0d2c5197b412044a8622a7ca9c41f3fc7b6c2cf0ea880b8951fc81ed4cc1371e399348970e5df24fb3bfb49091a9e36722d4f85dcc1eafedd828325c29e6187e5057ec3cea5c71018cc82dfafb9f927d2c2cd44043562da2a6066360a54c60ea846f (encrypted)
Stealth Address
c41296e49e6e4a6e657183724c781b57743cd8814aed3e6a16a12ed6e6b50154
Commitment
f0ee298cdc0aa812f7c9a884ddbb90108bfe48226a314e9667bdf7ecf44b9f54
Range Proof
672 bytes (Bulletproof)
Memo
dbddc3355d48ffb454f04df6bd93c6b932e586e8b0dd1f392620a24b4ca598fe91dd092515b156a66db01eb6ecc3b7f56dcf0bdbf09ee291d2fc012003ff60c3e48c5d19d0d3f185016a1aa6fe4bf9a22de8575a23727765fcc0c57d55681b227a1ff375131b87e1b0abebbcd9cf9173a9274b6797c8c340e4018b642185d95e (encrypted)