# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
c44dedc2a5f77af5235f650bdc1210c690917cc71a13c0ac448f26577368a91b
Pseudo Output
bead41f2690d996076b7f2ed69045823d0739e9fc15e070ecd2db8bf66e7c438
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
cad175c1bbc4074386d15cfe91e4ab0609411647013440ef0385b6d4a17a785c
Commitment
e8bfabfd5e0a7c38fac6b3c0e3972ccaccabf9981831b718c4e16bf3d6923134
Range Proof
672 bytes (Bulletproof)
Memo
a13355bffc28be3cc2b03ad7d8df2bfb86a08c04e30a8e8b5c98d97ff3732948656cd40e69e5af87126dd69ba6ec02ab90f3832ddb93df205ce6a328e5380469fcda0af9fac1fd3890a60b3b4789b1fb3fc21ab2803b5551cf049ad905ef08f12cd37be56fdc78cbee2d74379ed052e9f1e1bff41843807bc1beba2ab08023b0 (encrypted)
Stealth Address
14d5cd34c41f5cf3ac08a930c0c85f6c5b94f15f4e185184727d3a6f6fe1cd4e
Commitment
f895ad629b77a015c8ce13ebdc4ec63d9eb9d3be66b26e600cbc27e153347273
Range Proof
672 bytes (Bulletproof)
Memo
4b873c10f8079d7161c102a8689eacb4df95d18a704140cd1c07c9b2b7d3bbeb6e4795e1c209d0b40056ae9bb0c261a1550f2645fd124e5780598d93974d5d761c4fa0c8fce9c83b16082a29c41d3b7dc07f48f655af7844088d59296b217ef37b013a71502e57f598afac7b437be94cd7e5a81c5a7ca2297b644d5668f66887 (encrypted)
Stealth Address
483a5216578c369c5f9ae347c9a3ac2dafb3fa73435a25b06a254ab5cac1c67b
Commitment
9c1174f112901a7cf90b2257483eb6389a429c585780ab0c3d7f1bebb4eba141
Range Proof
672 bytes (Bulletproof)
Memo
9d5dd7c28757d809de39d730dcb7bd2421d67bb38fac7644eb86d288087c516710ef3df3e0b92fd8dafae8c942e04e6460cd575999395ad8340809a3b4cb10ef9bda69a104319f43e9b3db03731a7959192e331f82f47158787b28abf8104538abee60c2c200942f418cb796bbcf45f712c890f8d45d050a8dfcc1b8ace92115 (encrypted)