# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
4216cb32e24c72b3dcfbe4d32b9dc9043730923e8391eaa090f7b3897ff92e51
Pseudo Output
a03e003a795d496ec608367a1db930098151c0b66be54120764abb6069671b6e
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
1cf1262013cc4cb86d8a5e0a769712cda082f792165fba83e2c52aa9fb34c171
Commitment
4ef0e04cebe25714833116a4c61c79844074feb954854804667190a5474af770
Range Proof
672 bytes (Bulletproof)
Memo
92d755e56e619af7f355851231b474ed07878ed37a2dc1ce984303b967cad5a05ec0d3f298ae512d58b601b76a4ff3d78d34148012eeaa2c999c0356fd915aa204a9cec60d84085f8b577d4034402cc0de43ba2dc4166a1eefd3c55b19cdc6c128eeee38c2f5669f78a903033f1398f0d1f06838ac9ffc3da9b234b5d3fa8b0f (encrypted)
Stealth Address
a8403ad67e60fa68872304e819866c519cee8478c43c5437763e0968e55b3f20
Commitment
168c121145c852b8965c5f62dc118f75223064b78000d8df93e507a499083363
Range Proof
672 bytes (Bulletproof)
Memo
84324ba618b81a00e2f8642c069e40665a8253ffa16a1c938db1768ad5fc52171c7a8263df186e57d731ce66807bc31762cb43a6fc20d5496bbb722112672a24b93d57af59266890443aeb5adba2a81aa8b5102acb6c624deaca437beab7cef76195c90c29e708b7d130695d1c91bd67495c1ef0f422f2c66b1b2306b6120e27 (encrypted)
Stealth Address
54140e5d5dee1cf04cbdaa541e4f9f661282aeead3a4533b02183b4016f59279
Commitment
1c7213395fafb45f1149bd33d04443eab2eb3967ca0a61c9bf3a368c54655307
Range Proof
672 bytes (Bulletproof)
Memo
452414047959a7642756f06a1749278003aa7d6eaed38456a82e35ac2e1f46df530ff891bd6600b4ccdd5777551e4e083146754f7d551263a27c5ddff5a0f645921e2f09fd6c304070d42b3af9aec340ed6acd251cdc0c9b81210d335a7d8d37e75913cd7ce329219cb16e22f477f8249e68c3f5d61780b5c5bbc352586d16ec (encrypted)