# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
5c1a8b96760b85723535b7423cfd02257c440008eb1ddc84a07c2fc89a0b2868
Pseudo Output
ae5a28b96b3d4a55cc6db28b478013ae24ae4a752f3cbaaa814be8c449a2d668
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
103f25dce8c39999cc9f4d2131972615d59a84801f100f50caff415ef6a5f949
Commitment
ee795aa5e15b6496591ebab8d23c8cec368f540af24c8db3c67e874f6d852f46
Range Proof
672 bytes (Bulletproof)
Memo
c6565b86fdba4659ee0d27acf729b522ba914e0bb9f148a0c13cc6d9e55e430cf9a6fd33152536e886420890ab1080b3f03afb9997e850c23e941df86b8d2d641593d7a2c385f0ba6461a7ce42d49fd99e811c647537fc4edbe8dd8c4573ebe0dbdab2d997de27ee1b51c4c41547b076890d3beee1aa878818d30970c4bb4589 (encrypted)
Stealth Address
461bce63e7f2aebc6158548f76665728c66f09f16cac2229537cb2819a0f171e
Commitment
9effc3b1bcdfad5000166997041e23b0cdc5e728710fb465161605cbafdedc7e
Range Proof
672 bytes (Bulletproof)
Memo
64d2e642931675a283a6e0b170d3de0583f0c2914b7f365cc571fe6c30e231100716ca399068bba16422d47745d9807ca372766896f673544b08033afd92ad8aea50c7b21283506228562d8cc7e2197b3778972b5fbc9f3dfdc7fce9051d2751d3803d4eef0e8be0f97c1a2e3c3639f9bef1ef9d98213a2ecd7ca2e412826e7a (encrypted)
Stealth Address
9883bffa385b347b36493aea9662bba5c5dbaba18cc1eb6f9670581b113f7369
Commitment
d6e92933330f6fef32c20e37f314ae060297a3e9a4eaa74161931033d5535429
Range Proof
672 bytes (Bulletproof)
Memo
31fb34067d0051aa6b778a0645b8826c25e525e81fa4d8826df66b17072dddd709ba93e5471846e491489f79db339f472b17f66f2fac54d83ac31cc58a4f69b5d101b755f264c1d75723359128126290aee1b39e4c6938ecc3443417ca1fe972d7c942216bcce8681616f5e395e6b66703dc5c88cbbb2402ba0ad4f216195e2c (encrypted)