# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
fccfa60362b1113e43cb00f80bee10a964710918ff2d338c054e83123d92624e
Pseudo Output
9e83f61d7e8c8a393f8dc4dc0fb3407383ef856f97e6e95352e65f58a5815d20
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
a2eaea8899cc6c2a9c63cec743036d9473605606de677c8d36419cf2d5e5ad2b
Commitment
94c8157c0aab681abc14525ae2262db6df0dda63d3ee0636568f3541d2302b71
Range Proof
672 bytes (Bulletproof)
Memo
ee088fe48914d5a8cf763daa99c134fd87d6c9b03e78469e4cb7f16f7ea4415dd10976ca29a7f7c048dae0fa7dbcc92e56b865cdd7d9b7a358dfa9c69b393f902ca72541707f9210da819598e0645812c3dfa4cfb105372a3b53ff65e7c29e15605e5b3f3f6b69ae6b6b2d7d3a30004d596883126c4a69b29c174edde401a649 (encrypted)
Stealth Address
8e69881ed175587cdde0ba98a563af09bec57fa59abad30065d96c32f9616968
Commitment
52e4ce2660209f34afe9c9c83bcf46cfee9a5a44315e3dd8243ecb5c1723212f
Range Proof
672 bytes (Bulletproof)
Memo
3274ebaef88454b102ccb189369dfd8f915d4f66a456ff3b28327b0d4caa4dc880a35ca77d2bcdf7af8a862f3e6d4eff7ffdc3425a53b0810d2b27ff4e4e8e8cacbae2ac2314be37c63657802da7a4deab63de7253cd2d4e7ef8293b1c3d3d939b2a6bec14e57ccf74d58e3bddf729bff040e2b40e705ebf1c85c9c572b4e2ea (encrypted)
Stealth Address
e00fb3abae99c9108a20f4fed5a431fcd4f4c364baf79696d524151a4b4a6345
Commitment
50eb253d1dc4f515a20afff1e2f3e83541e46570a53a2f206da47bc7ce07204a
Range Proof
672 bytes (Bulletproof)
Memo
7d8bb6934429be8dd3adc496cd2330e50a8ca51f3eadf3bc5641f9cc7e7279309adf7cb031da82bf07b01541228ccf56f5492af3dee22a116682b1e8dc44cec0704268222d3cb7bdbb860bed4d43cc94567f7a24b0cad5afc0896ca0402a7d4b5e7b09d65d58011620e501a09e6f78c785a154e77d5c8ea1fc735f8acee02c19 (encrypted)