# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
9a175324661344a99c47fcd8cae35c07dcc79992c5b4180d390ee42dc768cf24
Pseudo Output
0022c8bdfb6d0f480ba3225b8a394b2104dc2ffdc6683472826e860a987e6d02
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
0ceea36332768cb0ba068f8c57b95bff8d9fb91942d198b7905fd69067fac47d
Commitment
74ebf0bafdb456531ffd8701709dc248257f98d2780be2fa30b5a1c322f0573d
Range Proof
672 bytes (Bulletproof)
Memo
2cdac469b8fc97874acca70532ea69adce99b689d6f8724bc6bb7f32e8e49bfb00a684afa78bb071c0ea0d41ed8bad0ef526c2454863972ebf25031b2301e12a13161f4507a15f81a9542437a635c2d6fed2ab2758df190f71038223a039e6d72c40ed1225adf64234479c5df01bdfde8d110d2466162206912a3399ddaa812f (encrypted)
Stealth Address
be649b2ab255fcb0efab2fa94efa831c5e4c549db04e61472cf3971920fe3518
Commitment
7caa842ef03f3e607a1bb485d7e99271acef37318c38896bf1f1a38f882b1e25
Range Proof
672 bytes (Bulletproof)
Memo
f65d9c86a9df4a50de1a542be2937f0e23d139d78970c13cedf57615cd28a15fed126603bc7f48cd5742f0cf50e1506954b8318ebe2cce3835c47948bf8a0d50c5c6e2d749397cfbed9502c6a83b75570abf4d2c3572bcfb9806f41b2539f9ff2795f7d5a1cb5dc9d8a4886ac881c5a33f0e4f559cb053e2bb6210e3e8af0009 (encrypted)
Stealth Address
dc01516442502486aff6a6c67833332893cb43d402548ff416cf62ce62688562
Commitment
bc2fa91f9ff22396910ba14a2cda768ed81f79f935c8916da6f41082e480c260
Range Proof
672 bytes (Bulletproof)
Memo
2b9510cbd5e7fee32fa05f2747775f81404d5193b6e5bb6acc2fb557f67f7f21cd0d5bd0babcbb4ccfe14f9de83e26b8bd2f73fd2ca3aa43583c088b8b143770ef92311a55a289f0df7f55ebff9c730cd6ab721c4a7154471d7b416b283dec04a0067945b7d7abfe5880a2b428620f644c1bab238de6c087bad8b817cb562610 (encrypted)