# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
c0add82f27876b18b83ff9136303b6f36625fd1685151a71c212d3ab984b3d09
Pseudo Output
60c61e3698604428600b79012dc6e4aa5b2b09d997d55b9654ab3e4b1702f474
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
a0b0ad326d28191a3f53cd113fc74348a91a760d69d207a1a2227bc20969f218
Commitment
e698be5daa74e346624ed8a5b948eaf9d3f013b493ce44cc491df84fe22d984c
Range Proof
672 bytes (Bulletproof)
Memo
9343d4846390522cb5756d36084668f51e999890016d2ea6858de75fc20ef4eab07b2b346098dab7c7e5cb7bc2ccc46ee9b7eafa7e51001bb4ce047f2db8dddf10d0e77d40a0256437f8089c91a45ad0e5cae3b43f1d7066da6e9a39502148deea2420734e8e0cfad610af512b5c2779f1bd35755dedbc1b400d09099fbef82b (encrypted)
Stealth Address
308098461a09c32252a82d04a8327e39c148b04396470d5f6113d6e84ea1467a
Commitment
200d3ee2d35bd49e0a562105766fb5a32af688c10bda4511c466cd47a44d235b
Range Proof
672 bytes (Bulletproof)
Memo
cf522fc05cae913fb62365f7780e02b20dd75a5b902cfbecd2b9a0d0db43fe0496c5e68ed5e2b592cd9c3d5bbe2c1206cadbc55572c23680b4cba6cc5c48ad1a2b5666b8ee754e09d64cb1f5f5ad6819537edee9e4df4ef01203df8a844fc8732f94c7702c97d2e25c4b3ca600fbfabf97f2f7a1920077e2a17c6a68dbc4afda (encrypted)
Stealth Address
7cdd61f8fb1da8befdbea95b542e993f370a88e4914c4cbb8a25f025d6a83c75
Commitment
8636eb3740eb8c6a468740e9e11ec6546c280390d8c5b63f29469e9314e21b2c
Range Proof
672 bytes (Bulletproof)
Memo
57d15130a680f2df663acbe265bcf808b362501fedb0f78d71f3ca1186c66d04583bd18de84311f5474ed9e7f628af482b0bb638a12c372de3e651b5d76643baf3e9828961481fec86a0f7e5c6e48c89af58ab2f98665e99b4eda680af35a284bafff9876ccef683879443fcdab86cecc64ff82b346559051bcf3c49cffc3387 (encrypted)