# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
a897fdd09eda5aad34888baf4b5898f798574b920c67de1992856e171db1cd44
Pseudo Output
c2cc4c5c8e602cf28bcec2f7220a60c974f416fe0d3740ef53f3ec6448c46e73
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
bcd1ffcd2e644cc2dc46788b799334849e867c038a667c9ceb18fe2fb156e25a
Commitment
1246d4937f3c5790ee16a137c6a40e9f76db63873151c0684d1bb7d307968c7c
Range Proof
672 bytes (Bulletproof)
Memo
d78235b0bce96e81aecdfa5943ceb71860e9e782a322ec324012e5fff52aed360aff40c25e5d9f6fb6c03bf198c009cea5a9019bc94465560d73755a3e25bc12a8d45f5dd962bb33cfc02e29a70a43ba094fcb2b9c6c0170f8712154c79897948858cb72a991b4058a0e75244d2f1705b82e675881cd5862d8f76f7d51387216 (encrypted)
Stealth Address
ba24a98693e544caef82174362b7724f768a057077c7fc28be9605dce652e340
Commitment
9a17b6ebd8ed4f71c6d934453b192778d42aefd13ecf6516bfe1629b47bd7a16
Range Proof
672 bytes (Bulletproof)
Memo
d48bf15be4b2129e0add8c5ad7ea54d8df26cfedd4d96a50017a0ca8ef8d8dcc3b987f7d1e24b550cf54bfaf57687f6d8b3049433c8c051c5706cca9527e5d9a21115b22e4a687b15a162bd2d6e49a999e209ac3de6559f7253efe4dfdfd186f884fc8dfbfe8f960d5491d1e5403adfebb689b610aed79d5f488b624b56e942d (encrypted)
Stealth Address
eee10a1a90a3d07e23168667d68805864f4b88eae372128d20c11fef5a863515
Commitment
c8eecc5ca3ded0ca173dbb5db3e9362b7fe0fa5f7744f957b2312c78539bbe7a
Range Proof
672 bytes (Bulletproof)
Memo
910362c05377e496ca8b6e090cee56aeafb75ccddd119582e65da47027e74fae289ff4dd23463d3a03fa829e6a78d56c0b729a539dce5e6cf72baaa16018f46c404509515efc335cfc8cff0efe0e035a0c624dae919f309adc8e8f0dbf5be0558208f976e01b454990e4414bca910367163f1f7679233bc77c56f021958f0dc5 (encrypted)