# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
c42df09ef7126bd8202ab6cd6158ed7a1e3af6c68cc93242ed94f98b600d180f
Pseudo Output
028121d2982e618bb748b76ff6908da14c8b44825db5bcdeda14923ba278322d
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
c494280c7b05cb227d272f68a0b7c411443acc3721af693022db809f3ecdf010
Commitment
8a2718045070e4e8c11e7c1086bdb222eb0efcfa38f29d76922b9c00535fb60d
Range Proof
672 bytes (Bulletproof)
Memo
c185e496586bd014a4c23b365fe1584f4a975ce7c1f97dc2dc4da9cfa49492a9b209dbe3578a4d8ebbc42285484c83936a8b25d5a8ff5a07eccb859e0578bca83ed90d6dfe6578d65ec0657c29eee5bd37d59e9126e6f9d7b6a7d90c27728e2e04caf4a8debc5d59fe30b8a7674431697906a14a092f725d3ff69ea6c7fbad4b (encrypted)
Stealth Address
8415235c4ecbf1036c4fa9b4fa6a5efb18070309216dea6373c2624e9a962372
Commitment
86a122d62bba3ac3da89a7e641d687c93e4919418a9bd5a1ac55fdee67c0d623
Range Proof
672 bytes (Bulletproof)
Memo
537e3d9f90fe2d90222f31683ac81fbd0b33df49db0117c805c3ace7b4aed61e9092084c2134e69c7b47df605876db1029c1182a21d565cc6cb16d4786692d80fc6234c8da7d7c40e3381b59031cdb3761f52258ed7d2e603c5a09d803f4c2c8bc83ee1faa339867196c3c763aa174500e98fe5cd81b123fdde68e084eb33cac (encrypted)
Stealth Address
6c264fa7ea71bb8d10e9c7b23eead07cbe19f0a9fd5c32c70987484d02bbc81d
Commitment
42b13598d004b26e847c64d5327539c3d8a85a50d378ba90f6a6010c4a0c3b7d
Range Proof
672 bytes (Bulletproof)
Memo
b3401b2115826274767113ff0742cfef2af516e28f3187ce4b67c03d1289d10d6e8b8176f8f7bc872e46db44b91bb91ebd7f11db07356d47c84631ff1ac18f2ac4be5526a715ac4112672c21fee54416161e408d60f34db6714af201ce97080633ca1b7119483ca31db6e9cd4577a6a39f697e1e210c66fd58355bad48d4b7c0 (encrypted)