# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
bab007bcbd664cbbd78ae822fc29e544e6c87183783b33539bc0d1aef385a93a
Pseudo Output
a04166afb8c9e48c133645a1301b1337b8227e68f7a98f88195b3628adc9cf1b
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
b45e709545064d8a8947cb6a16e7a25a81f68d4ff324ab70f6513ccdb6fe357b
Commitment
0a2533097b46f6a9e93c82098f4e55ae597f050bd8a07715c0b935063c86e62a
Range Proof
672 bytes (Bulletproof)
Memo
471bb36dd2e8e781c51f239e7559a8b72d1e3c4430dff2daf54700581cf7938234f12e0eedfeffbc6a08cd4d1fdfad31f2269fbf1790d627e3b505518c7e50f982c7eeb1004af3131271324135e014cce6ec3cb0d9de2a2cee5a53349119cf484c7f10bb466af27779ab55387d1d17af7044a20e9c4e9acb14f40479ae76633b (encrypted)
Stealth Address
3e429111042d4607ec896f3806465512de631a1ad3cfa53d503b35397ec4da3e
Commitment
c6a3d8ffd3650d664c0cd102d72016a432c9ccacbe0d893abe91681bf85eb14a
Range Proof
672 bytes (Bulletproof)
Memo
56f7aa40002391e634d0ffba5c8c88bf90f5983ed25f38c08b6a5fcbe662c77d952fff7d0888c811dc98b23ba8cf5017afc0a303361d14b61111701ee475119a17123e892e419bce1cc5a7fa9d9ebadc6ee5f1b086c6cd643ea50fbb2aba9ec26654c763af3c91214742825b45066c7b3395a0bc0331e81684f3e84c76d8a37d (encrypted)
Stealth Address
eaf2a7fad1aa5e2c755b3d35eba5afcbdfafc1c1ba4e59af205419b994d5b706
Commitment
08a02c3692f46c4db390fe5e87ffa021820a3f59d18525c314c0ca1e10ab645b
Range Proof
672 bytes (Bulletproof)
Memo
1f73a9e64cfaaa1eae220f0d4424afb16f87d03bc20f5a1990322b5cf17352f45537ece2fe3f96bb966d869ddfe03971e01e06a87e1cfbf3c13787daca35fa14330dd755f6d73bf826d80d8b0001b0d93387f6cc576cca28cf4d20ef13a301f160c268bf902524aeabf3de1bbb51827968273d258104080ef008ff7a737a29ba (encrypted)