# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
e81ea8fdd1b553e18498dacaee5aafc796a4e7c5ef21b17952e76ac4a602b373
Pseudo Output
1457c4767cc0dcc20ca27ffab42008f6b305ee9e95a7ede6c1b108e0b4f1c969
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
e811068e2a25572adcbec9f7ad79e91ea8705bce75f0ec98eb34b87f5b9f335c
Commitment
00ba67d182e408114ac460a7b8c4f7fc05883a9e84d281436b40d20aa66f3612
Range Proof
672 bytes (Bulletproof)
Memo
ba1aabd6e6085aab05b6fdb89a18df3615e900f9ea6bec0b9c1b607057f8a06cbe8ae14001de9c302eea94e4a9cadb2783455b6a3daf1478d0c1a1a2282fd98f484e17b9e4a86f6a64d2cbaf9e1b85fcdecb4527150599da4542b6989f24d0f57f05ecd306428d16206f281dbe84516d3c8af9bea2076a5b4207e2401a3838ac (encrypted)
Stealth Address
645ae38385987ccbd40bdeac4084d54b8f5a0b10a2ab4f6c1f8a9090a1a4720e
Commitment
5a14264a9f859ecb2e2326d05e874e9312894db3630a6b74b880261101542160
Range Proof
672 bytes (Bulletproof)
Memo
7130d71f5276928321ac03614c629afa3e187412b4a786ca934138f817362c83e0f3a4960960e4c157a12905ae078f97bc79e401e512620100aee267126bf5ba37f14bc5adba80f91ce1101ebdd5785bedf83df849fbfcc00ccceabda150044515a49af373f82147fa43e000edbde0e0c09011e5bdeecc53ecea81737103c055 (encrypted)
Stealth Address
8a2de0415382c791d690ef8058795e1ac613c5fc1d1abf539ec6296dff752d72
Commitment
2275f0aa82488f963a8bb3ec84e24fa100307f2cd5f30a7cab46f091a0b31701
Range Proof
672 bytes (Bulletproof)
Memo
e99b3db95e01736aad7881a22dc9c578cc6ec7f4c9a2a255862a527e43f5c1dd817e29f38608100d9a9204daa96001d3dab3c8bac6dd4146ba8aa878ea69a5b1e52ad392c167624ad9a5f74ea7b60762f2b3345535cc7d51a0b4b2586cf149a6f61f1d085073633cf174c6dad06e3b808c4719247fe21c4ad9b63c1e60528d11 (encrypted)