# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
8001a745b0c9f53a7598ee23eebf025af8ed7be4a9682a65f801e9911865bb05
Pseudo Output
8486de8ea7d88343aedaac59363d763844e0e61eac5a13f6ba2aebd9b1c24f0b
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
0ea64947249d2bdad35a5c04f053cfb28e4b8de1d7975bd7f7569b9cfcf39a0f
Commitment
8c5540b8fad6402ae9fd649b1214637ccf994af7d5bb958c64694e8d62e04f68
Range Proof
672 bytes (Bulletproof)
Memo
ab3d9f33c0fcef97fe5d909d47146c8441324ee897a606c1f24a97461f88776db597231dd594fe4454731c306af15930529255f5f5fc3dc5a884921551b7402f0b6a0904e19b80c06dbcc13292a1324c0957fcc49e9617930073ecd55b1f4c6dbc7582b6bd6035bec2e12a7d49f51c7bd31a32e178827f7c13b57dad80181f8e (encrypted)
Stealth Address
04abac58470c065f37a036c9c7f0bee5d57bb6fa03c0880d128fe853f7dc720d
Commitment
d2797777786f29b49239232bd64ed437fdf1eeb3246158a7b346ae6f7b1a0b33
Range Proof
672 bytes (Bulletproof)
Memo
13b70658250d347a5f25b445e71d45b54c0b4f4ba7df2bbcc7add4e04ac62405df81c12ff3fac87ae30b75ed9034e8a26f373dae044987649761b950b4266c9aeae9146d8a72ddf7e35cb7722615b0a84b9bf33b79fb4472a881e4bb77c791c782a287926e2619a7d02eedfdffe2b68db5aa194827a9f1681f6805ca6238f5ea (encrypted)
Stealth Address
1434af685d50cfedbe2a3b0e902d081578586932a08ffe63e511d28e991ff610
Commitment
94a063acf248700233ff8c28a9ce4011a0e24632c2202bee65fcba6c2e7b341c
Range Proof
672 bytes (Bulletproof)
Memo
2c7c1b4314fc806d039336c268cc124700efdedf80eb0840500fcc0494ce4a198c5bbe8453f7d40c75c7c9d99bb8d0a67776b645a2a474d366c188cea303f874f1ed2c1efdbfd5ccc3ba00186cedd9835d70dc1e0ae3cd215a20a7d1425e8b0b5ad0f44a7d652611a7e79be14ea709d89b8c9a25c37de852796536ae4490a248 (encrypted)