# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
44e0683a901a356da2c537a5fa11a604fe7384e0e2494d936750dc7cfa24640d
Pseudo Output
5459f15c0e98c512d1ea0460dca144bd4ddfddf5ea26f7f3abdfcd8072135e1f
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
a0b6e6ed64ca63ff95aeb5af8f05b9e73c43057751b014ce7c4be245454bbc78
Commitment
40bd7e96011f0bb0b568ddf5cdaedca478a17197e0cd2214729a7d9c1511012b
Range Proof
672 bytes (Bulletproof)
Memo
dac094b021335d5b3e485513cad3c60e3f51d1b385a8cc5fe3d08a85077221c4537c4fb2ed7e34c868cabe10f422700a1134190d08afa17150401a65ba663f0556b040e85518862b2ab0e8d70bd41e92fcacc7a54e85749156b031dc817ef910a9e34a694afea5031121cef6e21901bf0e21c00a8b39531cfeefabbbf0461c86 (encrypted)
Stealth Address
ca8f9ff8b5ff0ff727520e6723a956c74ad36f79370638ec2e979ccacb4a524e
Commitment
a696156c57b14c280d00c3bc956063e0e95db9cc9ed6b2dcfc1121ecfb2e3a6f
Range Proof
672 bytes (Bulletproof)
Memo
7ab1d2f2b81b29ace0f88b50bc0b456274ce586fbb2b083a6dbbce6de2d6f45a8c8a80cdff8233d3d50d6bf8a11892bbf44fab3032e33ccff22ad216919160a477c59cdeb5a3e5829a74f310fe67b7c690b16be208a0b147aa5559c55981414addc8bad12d8024dc94af3a10ad2299e9b22694b8b63645740cbe6f000fe7ba52 (encrypted)
Stealth Address
1caf7bd9797e05e8fec996c85c471a76a53825a9285582076fc3873e6645147f
Commitment
1cfff948aa2bd7f0684debfc92e65539a99a476689c19c7e63303443f1de3f3c
Range Proof
672 bytes (Bulletproof)
Memo
6fab4348412dff97df71ca88765b42a75b591b45f20ed625d9b44082c9c9663281b9190c308fed51069342a53a76bdc22d25b2224121fe926ae277f113672c6526249a8ea43f7765afdfd6d79575be9019ff65a7865c8f25986ee988fc48d26c227e39b52d95b9cca4d774f457ede56fa03780f6a62ed12d4e40232694527eef (encrypted)