# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
4c7995c47b801455e9e0a15a57369bde92a76316b6f78a869ca4f47455033431
Pseudo Output
8ecdb4d59d50d9d7779aa72ba2af7096e783692e39bcd0d98e68b6f29fe7c37d
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
a85644005713cf4a29bb1849a8b59cc187eebcaaf29f6b83ef3e6cc6e8b19c01
Commitment
786789ce92011d918e0c33a5e33a947221b0d96c7509eefbbd8c6485c8ef185a
Range Proof
672 bytes (Bulletproof)
Memo
eafb206066442fa4bee948bf01f68041a943deb8a141e45fb501572c5363512ef1a12e87f7ece8a1ad5df9926bf8d0342479c9e721d4e1e896c4fb5985c7a8fd820afd5d3a85469b9735539274cb23b9a7d2edea70591ef737cc19520f85c31fe11dbdb4c127d06e5ad6730425af506c5229f8e0d0bbe319e75c59952f4ee1e2 (encrypted)
Stealth Address
eef3ed2bdced2303ecfda6d04169ff859c508f6785d8c07c3892132274fbe841
Commitment
a47595f5ec9fe75279a06c1e8c59fbf32557d932cfc4956668b8debc0187e872
Range Proof
672 bytes (Bulletproof)
Memo
10188000f119261b04dc4ba7857a6b3a71e783fb09be7fb1527e6a4a18e6025935f2e8225456c0716041ebcb5cedff7ee9e0b8005c736bfc8ad25a9aecfd008bbf58a44dd1063c11f0ee514ac2d9db9a0f4bce53cd6e0a03463cf233acd02e388736d1eb794ab7d5171dbed264f2d2f3a7ac8ccbf1ca4f044d04170ebdf19560 (encrypted)
Stealth Address
ec81c273ba97e193ab37b5acf543e5a0535c697d1fd10e67f79054e6610e9b4a
Commitment
b040e6e67cc8b16ebb89f056224979ce500fdbb4f4481c7743dcb2ce5892106f
Range Proof
672 bytes (Bulletproof)
Memo
79f999f874e21f10140a03466dbc420c4f52424c76786587d8f76c4621a8a610ad3a8ebdc87f5c23e1264e9eaad20d4fa29ec20d4b815bda4e1f41130ed10976bb3c510cae4e07f6ebf3b4a074eda53ccdcb7df1b616ed94cceb8006a1805f8d3ef0ddaa32cf39ecfdb719c431b3e55238d641564a7e03cdd70b6fa76bc41f11 (encrypted)