# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
1e3d436ab9d96e65358162d955d7a4aca399da82ee4882fadf3f3586fce4521e
Pseudo Output
54a7ef995beadba9a4522d2404d7b89f33ff2167354ae891fce0397ddeacb71c
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
bcfcba59adea4fcae04a22c2d84172184f8a455cf7ba65b4368349ba2b6e537a
Commitment
2c05ecef3502696238c7df72fbac5a68c6d48f4c4b44731ed291ad37b7a4341b
Range Proof
672 bytes (Bulletproof)
Memo
1e70403409948ef6cb1ce8a4908d19488c8de19be494193994004fd0c266efe6fa5e17ae92991b960fc769199fc3d3d50d75508b864790db309502ae0561650daf4adf12a149f6c87db5a9dc6d408e3e8fdf8a3211137638f89b670735effc39d295661bd59056a4903265d1657a72e5870908fd6bd2a5d13dfee319ed5804e6 (encrypted)
Stealth Address
d059da272ffcba93182c71fed2fcbbbd460d25c28cee27847f73e6cb07d73677
Commitment
72265a056421b7ebc60794c5142cd07bdb061495130a12f70505f39c7e601953
Range Proof
672 bytes (Bulletproof)
Memo
acbb038eb00ebf00fc8439d8763f91cb98f208ff93236cc7a29fb12b88ab1adbeba163953cab3d0ce44509874d5a8ef70db21a11c0982cab78abf0dfdbb9359b065eb05205c2cd6b6064d3ec2041ed001a810ec08931ac9e25bdec5780e0e584fe3f29c5c52374b2522ab963f9a9483be4c068b65bf7faee71b50dadd9ac6394 (encrypted)
Stealth Address
aa94978724ed03d3479c284db44b74dadead6121c0da1f702f72749346c4ff19
Commitment
cc6f8c2a043da461c9d19c42f09833a9c288b4e47ac0619758250f215501fa08
Range Proof
672 bytes (Bulletproof)
Memo
24f84ee8c29e18f429f64c635c298b6b21422c918f0d623624df83040395b5ab76c255a7a5032dff955e0130c3b3dbaa5f5a4de7dd12ebb996f246e5fac49531400ae62648f9a695e9359bc4568aba0d176e8d92a4dfa5c59bd8c7b0f517db03851ccb17b051c8bb5137679c83adaf0961e984df2615a8b14cae0c7603116364 (encrypted)