# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
8a987e3e9c9c8c597fc1fa6668fc35effe5f9ba2dd2d9db709a22a07a2ce001d
Pseudo Output
94607973189c30ef158aead45567db86a2d7a9a41b7cd52b122651d2d9eb405a
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
302ee94f321e3f66b05950de041240eabe8726dd2d0ae838c8f9d32a4c1a8f14
Commitment
8c3bd333bf033f29837da0d65ef7c6db27e3e44a0b14d40bf1cf63aac496497f
Range Proof
672 bytes (Bulletproof)
Memo
97b5237fb301bd1ed431c88479c4546cebb198fb8803c7f935b99ffe4510cbf3371b2b0e95c732509e9885d2cc11b3cd97c07541345db0ee11cf2f83fe5c495e1534ebe0780eaa45e683579022ce50134abfbbe2d5a341b9be5db443035d0e714cfdddfa39c842227636f7b1f22fcd86fd7a0603e50386fbc7973af94a1c8e78 (encrypted)
Stealth Address
504c4c735212a38105dc3611a5f5d8f711dee828199b674a1520daed04b0f409
Commitment
80a6aba719ddc58feefec0f135a35767f28ddb6b972886b4ae062823c5c12762
Range Proof
672 bytes (Bulletproof)
Memo
f587c26f13f6d103799c08c5c2a56a42d773f9500c78a7d09d91141cf3cd5b58dd779bbde50312199dae30bcf5aab0aca2d55db7ca62766e5fa3ed50e04845236764d8a9ab31cf99943db40e472473ed1ec42e15495a272a38ce47b673619f7b88b3985d0f14d816741975ff81760bd5ae6d4a102e975c6c637bcd1b7e2df8b4 (encrypted)
Stealth Address
de4916a5db8f797b52ff4ef32cccf463a32c9dda1d6754029aba985c55bfc960
Commitment
ca4c628a0bbd645c26556b6fe2c5e7c72e61567496986cbb948f2220d81a7e38
Range Proof
672 bytes (Bulletproof)
Memo
82a3993cd34de83f2c724ace30199bb985241de972d23d05852769780a229e170265da21ec172b7388e2013587aa4cbfb588b9ce2113dcf37e6f0db010986eb87a3fc1abb5a12ba936467564771bb245adaf8f35449ea7aae720edcc0707a001cbc8f27b1cf14ce69271861ef2cf2260511eabe7277bded0ff724af272b29e81 (encrypted)