# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
5c35ee4dc11d8ee2d9bf4e18ac7b2e1463db9a2417cabec0062fbc2b7b3e817a
Pseudo Output
3a6d9f4c41e497c309b9bd62280a6e40209ed1837e2788685ee177705891bd19
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
464e60e24800ccabff43a366f7411bf1c730b8de2b5488d807116b5523a96427
Commitment
704e027c7128c90a2c9c2cac7803083ed544aba7994095d478d6512083bd233f
Range Proof
672 bytes (Bulletproof)
Memo
cdc7cbc11df38d60649ed3afbde3ede6a169417ab980ccd2ffe03d38fdeb6eb0a9bbc9257dde43c990b4ca02711a1684d49ddd149f3c0c29792411fd47e05369e3946ba2924a7a13f7aa44e319ab1f81856f8561914f4019d034c07a733e8e0bcd4404f6cb50c13b5dd3737c49f3a1df1411f7b2b117edaddf748881a43f2e7e (encrypted)
Stealth Address
ea6bb0104e6aea58f7456aa4c2e38cf69a4cd663460776db8977eaa367ca7a09
Commitment
2c5653d97b2d623783c38567aede53046aeaff014249a065404312884c55573a
Range Proof
672 bytes (Bulletproof)
Memo
6f975a6cc8fe5e8a2c48cf3ba8fa3056650a6d876c674a74fd8ce77360ed287e087f711d98b1d86531421578f51b78a98f3a10c2af5a2b5e027f7f0d6f36534856c18b2ea2fe493840278bebeed93c8a068568f7cf834971123c6f31a373c2fce29ea26f4f57394037ad23dac831d8c78ac30fa0a4f80414d378ead693265a78 (encrypted)
Stealth Address
b4fae142d347aeda46b15dce4845c1a5e24cd2d8530b968cbd435eb0a97f5033
Commitment
d483c6502689ab1594c5b78bfeeef145582af6b09baeabd6102bbf5ccf61e112
Range Proof
672 bytes (Bulletproof)
Memo
00c1dd3a464e09ba8d29123f737fcfc8e1d29b8265ded429521e6b23b3ce26f0f35771ea8477938f55d7101ec6450f6b505e2e6cd24a75d8bdecd68a8ff2525f83334c17ba502c77ecdc4d88914c2ce8a7cb9ce5ff51228352249d3462055e769a4e48a7b337b0794e28688de40ebebb753d2093f0e620a690de8affe74fcf9b (encrypted)