# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
a0d408d3c84ecb874d00990c1bd280a8e16f56bd5835d38ed1aba26a3f92d13c
Pseudo Output
78d06a31a55908ddb2bd95f553bec1ae4410cba795264154aad2c2713b21b045
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
ce8179879195ebf2b31e01ee638097945bbae6c9b1942736cf4b674bdea9a751
Commitment
a02b480076000dffee2cf31e3c2cf8b68f489d9d3aa14cbe212f4fd06e51a729
Range Proof
672 bytes (Bulletproof)
Memo
84fd5c010c0e0417c76ce35bb5a52a03051720d15ad8ef8fa0cba2044409e994e1d36e4dce89f4c04547b33b90e967338d181feb312b443cda0475b44f59c216822fd3d522c281b46e397c665fce074fcc991f0b7b7f4f7532f515ed5919006b2f874a77d72e233759ef2f3414501f5a2c026d19001a4c7c265c93b6c4692a0b (encrypted)
Stealth Address
c2f422794a3312ad31415118e7c82645cf0ab70fb116dfe93480e6e9de788e17
Commitment
046b6b32bbf814a01fba22908f069e8bee56d6920fc9abbb7aa42b8ad3bbdb6a
Range Proof
672 bytes (Bulletproof)
Memo
b4c4f604ba9b61b66a15d05761fa30386cbbba0d9bd29c389489e401fc13318526a5bca363a59b8e84b12b852ef2239d17fd9f654e393fadb473cb9300b7d199a1068ac2ee611f666ae3af77947cfaeb4cb983ae133110a7bef06466d753cf1174bad1af467a09e28b1247ade48e05ddea7add76bf4934bb90ca8ab86afd4fee (encrypted)
Stealth Address
de693bfbbde7b417f49ff60ce7627be137c7ac4c96ab16cd878c51db7e61462f
Commitment
3a73e59ca8976ea197f6c8625dbc54361167df439b0df8200ad38a19bfecd81f
Range Proof
672 bytes (Bulletproof)
Memo
339798b3e9bed5c3a7e86edc550c0b54a953d74d1bcaad7561abfe52c3c53f45b313c030f6be5406f80a020d0d257098a4f1d016883457b31379e7e9d223d2043b829d83c15d66190d24dc93b248291060ad09c8a9ab8eabe07c53a5951def05e8ad93a1dcce1ae354bfc59fe06bc1fb960d6d46baf2507879c796980b7d183b (encrypted)