# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
b680c219b9cafd2883a9bbff12da339e862c7e870fc0663c85a32d63d82e8034
Pseudo Output
16165a283dfdee45dff5ab255120922b655b8c2bb919a15fa108a2bf6bb56931
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
c62056aa5f31897d2ab91b28b5b1cbf7e924dc652c669b8b2f2365293621c81d
Commitment
34c19902c28376de7da3986edd1befa8baab3291bf5453b04889b1e462cde23f
Range Proof
672 bytes (Bulletproof)
Memo
aa42e54329fc639c304c992e81070f08c12b41b2e893d68b55193b1ad20d542bca5e5dc5633e4c7b0e4c0f85f86a2cc562819a43660484fcc28fddaff4f59cb87296bd76564400a8ba1edbb73bd0ef42b4a146f0817fcf6e9481d067ebe0e22d23c6b4aea6a6aa8bf327c5d4e853a10d7a3af0eac54a9c6b3cf757ddc4612e18 (encrypted)
Stealth Address
881e3098a23f6b0bc2a1151b031af35056fb329846cf11d7432cd2ca8c4c0117
Commitment
84b1980e22525a01e52965ea8805c97934f243554e667b643499932fc552712b
Range Proof
672 bytes (Bulletproof)
Memo
c71011ac73549e2f4ec697c3d8d5523f0292c0b36fcd8584f1e4ae71dbf1fd0c41bd52a1a21f7441618c331428e517eab53d2a5a5430ac8befa8075d7523507e7db3ddd602cbb8862389b53759b23bdcac2f403540b59a860071cce07e7f96b078c4dcffff8d8fe9c26c006ef299a38c29a1aa0ef30f99d08df7aafd8d9ce83d (encrypted)
Stealth Address
74f11086a5430ab1b593dd25a853c75b55347cb7e6ab352000ef6eb62e22f741
Commitment
2280a663dbcb41b532476071ca00827833f09253622c74f8fba19ffba22ab808
Range Proof
672 bytes (Bulletproof)
Memo
980ffc498d4759de38843cb8a2e4510095f9ce4c27389e46ad3f7c140a8aaa534e80898fc85ae8139444c6753a5ce728433f1b868ce3f59ac957a452a5704d5de518dcc263e3eb9055e7ff37ebd2376eb3dd2dd7dfffbae60f7b315900a9462615994677c7b22eadcf69fbd04a0789826ea6331f18a12f6a5179c07e90d280b5 (encrypted)