# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
9a5077ef30702ac1ddeec9cf4e30ad00572fe325238a48925b0d1d957e25b95a
Pseudo Output
32f67f2e654771134fa133fac62f73954a36e03a26acac1e97e7a7a9ca32a70e
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
8c8ff6112692b39cbfaae57cbb97e37e0a721bf6190448fcf4f90bd0586af249
Commitment
2cf2939c956303ae91902245362a9b94555c2549c3b50531f41def71b5464002
Range Proof
672 bytes (Bulletproof)
Memo
5f75220974c34af23440f8c76089f6f237943d247a9d0d6c71303af0a513f03ee78b35413054e45c33340252efa111bf34c8d37c52fe7b99000a7216bc19e487ce3c5d615b8f42798c8e0486412ec83e8b1db2f368c251e60febae65238febecb68292a20dee7a87abfecb5e51b69b80e5f7173fcb6496f5dec724ac414b2c0b (encrypted)
Stealth Address
00530b8ab56fd911c8824761d9f342b39f9841eb97fb491f21bfe77c2721bf4a
Commitment
9499c9fdfb9b1a85af67e3c84849ebb4eabaa79a73066b2c41d5242e57424647
Range Proof
672 bytes (Bulletproof)
Memo
316acf381b7018b762b9f18a575ea15551464b7a572b0f9e8ac2709d727b5eb6bbcc80a1610f713410ec358e16c68fe42f5fb172fc4adcd941909ed94b420f260a8b1ce18a6a08386c23e111628feec1eeaf41b849b3c59dd3fd585802d6362f9d1f3259f55242a2f4c1ddb982d5106c305a13a953ed63a55cb08a9e43e3310b (encrypted)
Stealth Address
4ceb3738340013213f9078fe4181696f959216be3d2785f766a6b0a49073bd77
Commitment
08228406ef5c69e7193d8caab6b2dde91d17ecf9ca445d49465374c0782b4021
Range Proof
672 bytes (Bulletproof)
Memo
bf359bcd2814110afc8979f3baef8dc91cf36c82897b6f4036864d43abdfe2a6016631711b37c4a05a3931743f6a0d71ee32a9dbe1a803f308e3f456fec1c85ce875fb628c3ad9012c4c0645d609894e21aa4e39b539ebba1f4116017697027b64f4b4d54acc1cd77e2449c2d2e89274aa55368925378cc37653634140bd7aa8 (encrypted)