# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
38f4f2e10510d736553da202d4706894aabd9875676a0aa389c64c0bfa161b71
Pseudo Output
4e9e646cc70148c35159d819f9c6cdb0893cb23cef906dd825714c42c91c9f75
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
a87bb4eca372b20df218d3e554633b5348766740385157e7049d6cd36cc61076
Commitment
a0bd0c73d52f5d22b1c4fc6217af95d8c3e796947975bdf0c2d03fd1d3ae3a49
Range Proof
672 bytes (Bulletproof)
Memo
0b2621fd777a55407d02d6bc9e749e42641701fe3b1a2091aaad631f5895eccd991a3c6ccde633f18be89653d16a2d6f0138de3b69e53981a2e25290d4531dbcf471e17e10fe8c2298001a01d52024e81f248d7739eb4e4b5ae2ffb16d13dafa2edb68a2024395a6e468c43bbc94557c824981a736a2664d461088714ae258a0 (encrypted)
Stealth Address
6c2eb5a5a98b868edee10585041349df21fa9d01edbd973b55bdba3dae6ea933
Commitment
4cf5cd30ebd3e38e73a716bd7dac3a11e227328a9470671f1b136f62e068f05e
Range Proof
672 bytes (Bulletproof)
Memo
4fd5f11ab2024a799aad64629945e9b932bfbb3e47c4218e26767ae006056a28b5b043fb4a52f68ad57d0f5b93884b6ed1f0c8209d118ff7d0c34399b05d982ebbbe34f2d8771581fc23f367fce19ffff69790b660bacf600ec9f5d2d0404e0be03b8c0bcbea0b65ac8602e9239fc6a26f94549a182b077e57e68a44ac6b00b2 (encrypted)
Stealth Address
0ab30e187b74b0a70c6ae2f0191ff753cee939ac32fc48de48280c9c39e3db31
Commitment
e215a52f00fd0a98f19b2b0c01262867e98d0bddd9638d7edb2554269e00e109
Range Proof
672 bytes (Bulletproof)
Memo
dfa6858ba17f7dc981ec6f9ee9a742f9ca2202829eb82b37b9584c17a9504f3a307d61ef1bdf2cca1ba0320b9fcb92738c22613307c41bbdeb55692a28a3d9e5a6327d795257265f094ae116bf4ff7d6d7f221d801ca279ecf34d954f6b6060146a55e74d7f45571ee4f7579ba169ea703a2a6f30f96e9e456d9dd8967bc2d5d (encrypted)