# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
16a02ebdd7addf56800e2d24a1dccb049cdbdb4a7219206dc6d26008364a8d51
Pseudo Output
0a7fa8b96486a4a5db6719b8edf6b83f8ad75e12b243c44c490cb98a13df6632
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
1c20514e8598d823eed561213dc45c158178908bd21b8ee5dff9e9de3056e25f
Commitment
a482cb40635b54064748db134cf114ca51ca2e40ba363e32d584983848731c75
Range Proof
672 bytes (Bulletproof)
Memo
081af1d9bde7d003f12702734549bc132ffd5471ff5496e403856db9b4f016e4c06d84bc232e29a912670080ea5f8a5891482289a637e51345028b19aa2dbef9391ecd2006fb4dc11b939805b4c17ddbafb4a5bbb7ccf94e703f529fcd46072bf5fb821b17e97d2bacf9d847df6479eba43c0bbab4ffd2c7e9447c0a9443927a (encrypted)
Stealth Address
982bd4dd0efc4c327c9ee37cd31ced6c64de8af96b7e989b1125a444eae1b332
Commitment
fec5c3fb641d2bbcc2109aacce532b94d8621aef6503874b773f5102dcf3673f
Range Proof
672 bytes (Bulletproof)
Memo
700da04131de7528f124e38245af1faeac8c69e44d2ec2bee5b8bbf57c749680b2ae61b9ad1f5952e3209daefa92594d88fb6731472da549fd507565e5f9c231f04816a22f7f981cf423451bda468ade6e01092a664b4cd469c0955155fd0b1b2553fd1219796cf58be3c1e37319a72aefd32727bb033f3653d9a379fba3bf4c (encrypted)
Stealth Address
de595099661f9f1783c8f4358d1903702bca69145f9381ebf1c39229d837946a
Commitment
eeeb1ca72d88bf6cb90c7867785f438165be0e6f522bd6b1e548fe2b20fb5725
Range Proof
672 bytes (Bulletproof)
Memo
1a948ff37eaa245c83acde3c932dc1c8c2b9ab57760a76a31df0894edb21c48f704e3e89328a542ac001e3f5d7eb0fe4c97e6225a701b34b4b9d9fa7ab06bbf0d942afdc5d99aa9794b4dea2c35702f24799e3fcb35bdfb9c53176526bf13b7a854e9606df613847c8dcfda18f491361c56c9324063dd641870642344832fb1a (encrypted)