# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
3a31ce3d1e50de8a9271e7160449ad16dfd25f4464698a41fd1c508218dbce5e
Pseudo Output
e0d82a6f5e2c132a21fab0ff04e483e3e8beb2021cfb54d3970f7be5bd25f91a
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
a6820eb9f0ef4dff26bb29e8da37ebc5c8d251adefb5c600a530db5efc68800e
Commitment
bc8529e2aa63a5cdfff4110b41d6c7bca964c646fc4d61e3a57a2fa6b08e9339
Range Proof
672 bytes (Bulletproof)
Memo
a255d3f0cbb5cf8eb4cfbdadfbc89f6f17de4547f05600c2793d5e3f30ae122ea0200be34f309aeda883c4c2a5b8565d86912a87f1418cf6add8a74eef5cb673b6f5c13c61945c5ef1d38c038c627537bd5273eeb3ed439e7127668321c63e15071b5a7018ec4443cec5aabc6207ba188e383558a518af87f9d7314a403192bb (encrypted)
Stealth Address
bc7becadca6a093288ba2e95e4dc7a94264253bdbec6c11493c1e184115ab873
Commitment
7832d87fe429fe0be2c0114dc74afe869c8e1778e09c1bc06496336892557f65
Range Proof
672 bytes (Bulletproof)
Memo
4581fdbe5575b080e04b3a7010e0a6d175b04382231e296d8536de17dddc59a018f13c97cfede8e097fd716d8cd5fe229bb9ba62afef525d3c48f727aece41aafb416380bf1a4e9068f84e6a3cdcc342a3eb180fbd7cb423a216edba3507751087849bc8c9293988c2f5679c73eb560233eedab87f93849bc6dbc750d42350e1 (encrypted)
Stealth Address
426d43c71c40ea0d2712f9d4e99d791edc0474b3358947543df5f7194c75b558
Commitment
e2e940dcac3bc66d394d6d3699e963bddca567f33393383a0be07102a705ff77
Range Proof
672 bytes (Bulletproof)
Memo
b7e2008123d08d96c03486ae4adbb24de5c73154f547995e74561b30d31a83f3cee8bad368571a0ea11ecce2abe888444b64badfdc83c048c861a24d8f205804db7899a38175a9a6a66de9617797714f1acbf0a6df50054596b759a1bd570ff96c2ea4acdc6bae86a9e02daae17e1e294e6c84e97cb697c16e4b925bd9cfdfb8 (encrypted)