# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
a88fcd2533ecc1d944addce909877b43c4f7d6187506b45ba831a5fd80a7ec7c
Pseudo Output
18c7aeca98f754b612da7980aba7ddff72e60e8cca18626b50fce40d1dfc1e0b
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
0c505005b8d56ec3ad7da218b517c7bff0dfd85a42726155a9c3b9ba25bbfd14
Commitment
f2fe11259af1e21c5d8f673eab367ab477166b1d27248a3f9808b640a771bc4f
Range Proof
672 bytes (Bulletproof)
Memo
b66cc306aadc6f4749fcec176140ff38d03d9e45c8eb1d13635352ff4723d209ac5c47364619ef05873741756852e10e539dc41dda24dc44604a3459011cafcaf213e1fafe79a5c334a85068fc15e55edcc18d797236f57a82d474ed01a4463835780eaa11452dec64b77141cab9712d7528e8bd0f5b175dcc1470d02f55925d (encrypted)
Stealth Address
42464b8a009bdf51ddea15a3a6ca7b4e90c19226629a9084b851ad4284130f4a
Commitment
08c37b26c947cc4af122b5ae645590262c611ea8d9756e27a16d9ce1fff48c7e
Range Proof
672 bytes (Bulletproof)
Memo
b9069e804c09d7ef0fd125fe7c89af904aef3537cda049469c8f24d99eb3a86c1a40f2871236247fab28ef3eabd98d57fe6d1a0d5b9870e0c338dc7ae1c2b1a9a8b2da27efd7153f5a51bbc45352744851e1706b8c44ae69a901631335f066cbb9b4c7f6cd3ff3761892351b94e31ed264ae886b60cc47e50042a342f3b668a1 (encrypted)
Stealth Address
34392e7af322897677a2d3f85b956fb71273599e9f2078eb93b64c81514de13a
Commitment
ceff729848fcc5be6666923f92d71a7338ed439fecaf562af0df13abd69aba1c
Range Proof
672 bytes (Bulletproof)
Memo
84b66a7a29f887fe572cc6f783bd9219f888fd82f9c08394fdeb2ae252f05ac17b6076bf5bdde45165f86035a7d529d178e7be2465e15054df1aecd3d089e12141b9af61c96fd1d3c9d79d67646e7031707d2aaa6747e54fc93e954d7a05a03f178cb79bcc296f9a26c22b28fa727be46131fc67985927d0b9341d7cd83681be (encrypted)