# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
76b4b89d1a14ad0079e26118e4831cafb7e232ba28d3c45a814263170dde5037
Pseudo Output
e053425bdc9af51f1a504d0edf68c51a91284ab244ede1735470a4301cfcd67a
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
a0f71a682f9b1d4b00dbb8e942162dfffe908a4a25f82f20f387e6c6a67a410f
Commitment
8cff23c0c0ebe74eed65fa01cdcba7b362cf7e14c400e0955652b12d97509100
Range Proof
672 bytes (Bulletproof)
Memo
9551651bd27f288c990ef922761756be8b8e80da9d84a9971c98a515c143ffc78e950677daca4a980684aad5f63fe065586683266d71500e73be30908fe549dd0f94bb740586bd214ecb799d89efe6030459b906c5f8b38fe0aa08dd0927ceda48523a1c213fd1e3af79d8ec33caf80418304d6bf064ff8d182d2b5c54a1ffcf (encrypted)
Stealth Address
3a6dc14468732c0f147dd53e3f963bf54936dff06f9fe45dd6c26495de48a134
Commitment
463fc0c84a042d1cb743399f0064c64b5fcdf1a85b43eed0e65aa3af48af3a75
Range Proof
672 bytes (Bulletproof)
Memo
57fca3f79e35055d65119c4d36373df16e1d9da13929b5f0c6b972ad9072ba52980da3bdde0d1bed12e47a0a4c41bbd9de04e7cec48e962a440e8d957aeb1989863befd0a253d8d16e78e19e960d4300415b4df4d22c1d1351f07871585ea1146a44ea3954be59fe3d0134e507233a62505769b761b2addf8d9e602af9a90bcc (encrypted)
Stealth Address
a8b8feb7078c2182c8886f2d3e77f1a85a6c0341b48fac2cf374ee73bc0d4639
Commitment
f439415a1e8c635492cafb14cf92a63d2c980a386e8499bdd67f638b081c470b
Range Proof
672 bytes (Bulletproof)
Memo
a2cc0f805d2345d8ad9d6fb6d37f46091b0a35a2f54b82819c047ed130a871df6e92581e729fb8cb568a432188962d9437d6a0abd50b1163d189f9a1e74b51f6fc445f74540ddff4eb45984989a2e1a6b4b2a00d44327ab6fc73bf16abfd113e4c3f27e00e01dd8ebafae32df722bd1631299e7e671a68d98807241918b268d7 (encrypted)