# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
e01b905474f1b6be7d0a704c6f08133f9ea011dea4e2de4f932eb6bab9b03d6c
Pseudo Output
d0bc44cd07e9b3db6b0573a567f2f82eda12523da6888ce09a3b862e9994c94b
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
4cdb7795dab2adbf54e132f84477c7be6a1cd7df69a0b75881f449c2906ed83c
Commitment
90b7bab6607aaef641de0c95cc4ca6749110b6bd22678d1b62d5e4ca407f180b
Range Proof
672 bytes (Bulletproof)
Memo
0c8d5cf0f45e4cd756645639afe8eaf43d0b7e085eabcff82e80745d0795224ba6e415c119cd6d4a117c91d8d4671e26a654daab6568af937e61f07bdbbc9ffe5991bfc6dc4eca9fab9ea70e40b557f0d4a789330245cd37cc9258d39fc44fa951f060445125317ed16533b99fcfa34c935448b89b4881d91e7643c1d7efecec (encrypted)
Stealth Address
103aeb6e27bdae1e0767622b3bba84cfc86c9fe226dea8e59c9c1eb6fcb46013
Commitment
e0029dc59800ef07ff1b776ebc68633cc03d9bd15a407f6ba5999a0d83c6a65f
Range Proof
672 bytes (Bulletproof)
Memo
a308c02c7a0f702e3f5aeaf5519deac8baeaed676726be28f381d1f0be43826db566ae1babed1acb1a8880fde8bb37d3258f4a0f8924cb5c1ab7952735b0b02c839156f5a7c748afcddf2959053200dda9e95896d3650b3d1e346e45ce3fea627c113bdc685461496d35cbd31ec7d35e900cb1c84dfcd0901b684a63af1c231b (encrypted)
Stealth Address
2c78dc34073fa17bef8ce602676e3461f0c6ce8c377cde80b3534e189de79813
Commitment
82180f0705872c03ebf2723d81a943e03a332914924e7bac8460fc0c03c4280d
Range Proof
672 bytes (Bulletproof)
Memo
bf80a70d0a08c4aa51bdd27a59ca4de6f2d2e125d49b29410afa72955b0a15dd4b85db1afdcfe63d98d5d4adcd5c654cc8f30c1b5c2ff521ef1c41b9a639b86de25b4d5fc3f07263f8b19b6bda9cdd8af64a226fabcf5ea663831f59798764376e70215b3cdaf12209ec464e1f4ba336b63e92877776d7110acee5f1b4682de3 (encrypted)