# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
c2207483ba4391956c775becf676cd33742e37db01ad2dc11496cbb7ac2f2426
Pseudo Output
42bd51268d1f9a216883af0747194d8c5cf810a8dee160cffb9e12ede538a60d
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
8a8e076619c35d43768bd03e9914d1adfbc56155c6b6f325f057416c2a5e1667
Commitment
9ed3538a04247a6050875cc246a4bc7853767d4ba447672196b7bc0db603b97a
Range Proof
672 bytes (Bulletproof)
Memo
c0aae1588a8a4483245c4e1d976b07397bd8d071cc07d50679ca9c2dc25fba78ad11581afa666f75454205dd40aa935040b9f1d5cac2d3494e6ddc748e6fae2035d28c7c6af982f8ad9fd999cd36ca0ec337db1c83ae9a041412bfee6a41670723a5ab3fa363b5701d6291c301d8a2886aa2894e8bf29e3e9d7b9ceecae8b8ce (encrypted)
Stealth Address
2ab7475a9c908c57ae7a2b47acb45d533b7e270c0212c828704989df80bcae52
Commitment
f0989ee9657009281c0384803cdc6fec5d87151f015b8e0d6bc68c3ba9967b0d
Range Proof
672 bytes (Bulletproof)
Memo
47d899814f7902c27a138bf96fa4c3b5bacf29245323307b2de589088db1db6c2721b47bac09760bd06e9bba051a9a47a45c0e4f2a897f8276cdd3dcf7eb685c3ed5fc9703aff26762cb3374b0138e638dc63efc59fc52ce9153f0c08f3f20c866bb23fb5fbf13249d401f4544155b53eeef21ffef4f7884876a7dd25b5b94fd (encrypted)
Stealth Address
7232391c76a41bfc3f6fe7b2f7fed53bf8a1a18a8f99db00c6583fde1615523b
Commitment
e20afedb061cefb234544dc9c751cae69666381677db4674ebfdbb782e2eff72
Range Proof
672 bytes (Bulletproof)
Memo
6fc7074333891576601e9ef5f5c8be1ef2eae81ed6238ecf4bb2b424343e573bac9bb24a153fb726599ca9119668562bc12f39bffb303dee8d5947e4e2a1d96958c7ea67d97f7522cd1b61ab9e7fffab26ba4ebbb846aa71bd63b63eeb1f30453b97550f8888bdaf801ce19935b177a3022aa25c22f9982e924770ad573fbf80 (encrypted)