# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
2cb4aa7dbfe36fad8661f0423a99ae5a5ea4e080c8909f45ae009c9e3685546c
Pseudo Output
a8395bfb6ede7d7cf233baa297351a405b17a1baec74348e341d54435a590439
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
0e2664e19312155f73478f22c834dfc513fe34d62c29a36d415e40a315499c69
Commitment
36221587b4cdea2505093e3bd4ea005ceb7e533bcc27c16321b7ef43d720d529
Range Proof
672 bytes (Bulletproof)
Memo
0e194124c51d52c536d2fa9f06a6327906067c34343d57fe3fa5554910789c947e75085796a33291e91b04b9fa431b4ad717d4ff6b5540631bacdab6f5abdf65f6e1c0ca15bb0be6fa44f098d31d73a3fc1ab8fdd4a072f1eab4bacccb00474760ea03bc49ec4a1cc6740f1435b362179705d0f0a58e25f0d2120ca24dfca999 (encrypted)
Stealth Address
f07bed3ec08e98ea4838c82b0434ef2fb7dbc3d0fe55857b94e1164f3b783d17
Commitment
32578559425d90f59d0ea67fdd136f2223a5945153f0693d9b8687f29d66bd44
Range Proof
672 bytes (Bulletproof)
Memo
13d71bb73e5e0880fa392ab12eb7b4a0c175ae1038f6b495b90948c87c849714fdd4987805d8010ba3fac338582432848440f202575130007c23f50fba4cb5d54bced2952f78baec1cf6525af73ed2e3e5001e134585ce236d592a691e47557a40bc80e0a529376168ef8ac50509b5e23441f74389fa392b7841a3e3e6246ced (encrypted)
Stealth Address
70c7c91cf2d337f7015745ad6c4f3083264341d7fb628bb1ff59e55e27e3ee7c
Commitment
1826b0123752af807a272c282cd64b37cb4f2e8dd5080cc86612c59ead2b783a
Range Proof
672 bytes (Bulletproof)
Memo
74902e2af6ac1bc5781e4ea5a732ad892cee570690c762f33ed91b8cf7739f6502677b5e0756cf82d24583a0a55b83944db207bab9a7d37d29cf6c0f471dd5fa86d0cf834df32e68f84dfd362d2494a6c47b17ba167d9a612201fc8c2e19417f98290cec361c0a9a14c3e59534acf4472ef2f27eb4fafb73ba3b45be93629d4b (encrypted)