# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
141f377729ce27d5faf2d73ca7e4cef2968a71e63a186c2709622a7506006e07
Pseudo Output
2c3a65820910d4c670d2df5974a0776a4581dc5a47e86971b76e6f4cf8bbe20d
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
303f560808f67ed22b9ae3e71ab46f77f70d2435617af53230daf3f64050085d
Commitment
26515d223cc0a4e3a29e54a31f7d702c3d55db641ae95aae4c4a372dea0e9c3f
Range Proof
672 bytes (Bulletproof)
Memo
cea7d2886f3ad76228039d0a0bbf40154d7a8d76c24b68096cd07abcd3c0f64fe3aa49836cbfefc1731344071e345a73b3987b15932881678f16c05666aba367a84d4d6759f2a62424f90b43527b8af730603f187ad4e6a3d36430e97a9fc8f708f3a814090cc26e2eaf4f28825bcb6c7d8b8050dcf50d4c140054be73d2658b (encrypted)
Stealth Address
825b0a7f9949b3a19d58071e2b95e83a5ef0093762985000b39796ee0b457b7f
Commitment
d0067b05ed1fe803e331e521c6544a67b81980cc5e89580321f530f39fa28713
Range Proof
672 bytes (Bulletproof)
Memo
ce9d5ee1a1f2a4016a6f644c771dca7bb53cba911ba437f68ee618c71f24d435e594ea17ade9a7edd2c2a4834b5a25c0f0f07148558ac41a90dd340bcdcb78b2dd6f5d751846b3ab895ca19649a894ae6c9286be7af19ff694383edf493a7b421b3a84a3efa4c7ad594def4f30f1c58b273b2a84c90e29d1f6bfd7f350077626 (encrypted)
Stealth Address
ec6f35ce491a2447306559fd5ed4be3de9ad0e41f05fd4486b04d512eecd3213
Commitment
b2bddb5850c77381bc29909d4959959c22ae0ea02e2bec6dd37ff7bdc3e89238
Range Proof
672 bytes (Bulletproof)
Memo
e9fe5cafba5edd050478cfd8b69bc7a74146b4ae8f3338ef5b9254eacb26d16d981cd550a1363348459d912ddfa02b561f2dcc9fe50cc4a1d46b62ef81c513e3491a38c04e2ba1be5d2c96558a63f0f1e36c8a70d5fab64fc6fdbbe2550bcafcbc7e847dbd1aecf988dc3798437fbac730a88736057f557acc7702c6b61f855b (encrypted)