# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
c4aef0d1c5ac8ae556ab03fbb84689c6a3c86c79bb135668cfd8cb1b084f155e
Pseudo Output
f0155fd6e8e9e0c0ec9592c7fb4bc6499d54e871139c8e96755665c9e3ba1d03
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
162c78914d84d54a4339b56eeead5e321af99b5bc04ead2337e5288852aae941
Commitment
bc9c57688f353c0a4bb8cb0e75513aa82ec2a5d1e17788aff5c9ee4b26d6ee64
Range Proof
672 bytes (Bulletproof)
Memo
80e24fdc25c281d48e55c860078581bd74c79ab993c87b191493a5f9acb61a0d49428c19b14169eb50a793e72a63374dd93671ddaa29795c5a684017f4bc01d500ab2305eb7d2ccfb48a0af905a185e3a158137795f465852e29595cc6da2efba865ec0e4b804b97e164819c6567149d2e6a69c06d3b06c6ef11cf8839f4ecbb (encrypted)
Stealth Address
3c75d5723842972a56a89fb781bc49ab30366bb44406edae5d2e1684f13c1558
Commitment
fe08af466fc109d976feb7b3dbee97f0c61081c836c047cbc8f9240492eeb075
Range Proof
672 bytes (Bulletproof)
Memo
6c0ea56cc49e122671fd34ccb65e6ef1f9c8814471fcdec4c015430480133588cec61c44bf2c5643c4cbf78ac98f763224382e12eeda4389b30755b329cbc5f4c610d049ffc2ce09eeaf9c318f87df9b1d7ea747fdec68c29c2b3125fe472f4b882bef663df5fd5e2159226866487f932cb079bbdec460bc4721c2796796bb7d (encrypted)
Stealth Address
581d451c9511a73119d3d1ef3061cfb0e8e43eba5ef1eb921a270f7e9ee8117f
Commitment
9a38113d0fa969d5e9d5fd9eb83060355b4486e78dfa0cd37d994f18e6ad2561
Range Proof
672 bytes (Bulletproof)
Memo
90d42dad4ee74fcc28d3f2f14b48796c7b519325efbc003465aca3449fe0e5b823708cd24249bd538f5c1e471b3687bbd19f0512a71c8c00f0c7354db3c5fbeb9037d14c2b31bc0bd26e56e6c947e8e1b170b60263c604b7824e01e7cec5bcfb49b4d877aed864bf93db7518a70cae4ac95410e6ef8e74eaed9447fa7d5df763 (encrypted)