# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
e01da6c35ea95767c87f9c01169f9443a4bd97c18bb3b2337b8250785b407d14
Pseudo Output
1849522c4588541a78918d6b5670f25a14c96ee037f6c4428aed68112e4b5622
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
4a3ba9cd681ac07a5cc76b0b563926340d27986ecbbcdcc93699398906d5f766
Commitment
80bacc8a48be522f1d13302981dd84df51e37c5d811b28f41f9045606c6af66d
Range Proof
672 bytes (Bulletproof)
Memo
5c5e4d49308445113e84a65a7e820cd4afe07b40d2bc69e42d9c09ac5024c3c0af20ef703fa1411ad2f2188eb1480e966203df08dbf2bb250f9737b999c75b1cffe9243a35fa9641c654cb34119728491ecbb43ac0f6c51d2edd92454a8e054cdf3a93a1df6e1594ae674e1a93b510cfd4b70b3c20335816080c29754b1d8472 (encrypted)
Stealth Address
e42d4e40c28661eff327939b61270090657c42147f97c060dec7397feb07b615
Commitment
66115557f755d879d9817cd2c359b286d66096a1312fd734a5d022cb7affd01d
Range Proof
672 bytes (Bulletproof)
Memo
d34752bf8bb743d61e1d722ffc8bded7415528dae67ab327fe41ac9b2d049946aaa194dc4938ab03b4464effda62873310ab6fdcecec2b52881ab1ec864fb8a7129311e7223a5bcc4b3ee43d1f7e041e591adfa40699e099f4a171e83f404d69a6ebe5fa154baf30b128648fa7c530e05b5967e2d4780db9e825de029633250c (encrypted)
Stealth Address
42cbdda8659d97c3d8c4352ec0496c66ffa81a682e5f2c60990f6166f583940c
Commitment
66fae3825493164a65cc99d058cf46267729b932841ca8c3c0cc044d1969ba6e
Range Proof
672 bytes (Bulletproof)
Memo
0d5df8f9766d75ff47053931f150f50d548fa0aede2c05ec7637bb3ea36b0a3ee25b336a2c116e4f5658d313f73ab5031916a404506c55d206ba9abf3acb942073cd53c33e4d5863f5c98b131a924d1b06cf4379c4ae16c468685d445f984d3f9d1f0fd96f217f3dd734da03ec30f252e8bcfc8dfe18fff34ef6dd7c1c588b75 (encrypted)