# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
aca23a0c47812d6f278475db3dde8d0a6b2c67d39f5a599ef59c1b6a94147f09
Pseudo Output
ca16e433c9ed3a154b1eb2c324cd6eee00323584d38208e007768378862c3a16
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
be614b19212cfea6eca52af6aa5d79a86a605a694473f9500cd8604f16b2133f
Commitment
442f8f9e47bcff7330ec331628d9ec7bac5ec5dd933f5cc291ddf2b45895af56
Range Proof
672 bytes (Bulletproof)
Memo
375e19ecc76059a7fbb135c8ff5bec98cd946e48103a8be450021fbfe5750535add69cfc3f1d7db1c47ad855616eaefe82b1e144eb2429454bf195e582c855da08dba92831d098b012961eca6781382f145403ee2b7591f30408bd4e259f2bf0b50dce050ccf29f8d9d14b4c039ee62dea7867d3746742c088a0e30a68037d92 (encrypted)
Stealth Address
8e90dfc089e59a24de189768237e51d31fc35b1f62f86e8382da93a6a5504b4b
Commitment
265dec788846ff68304ab2f7bc1dba49e2a5f529feac4a24a404f1b49f90cf3e
Range Proof
672 bytes (Bulletproof)
Memo
36017900eeaf6b1c2f0d10157e75f5b7ad43770bc802a48f574883a156d16b3980000db956432fad4d5a08b3e392901cd97c5e79cb0c62fbe4c9e8dfdae7d5062409ea7d4526578850704b57e4b639efbb66a93589ee8dcda2abc0eded05f3c26eeae5079ae10c3a5dc1051c3db9fdff905f14a8988452976e24f70be1f7b789 (encrypted)
Stealth Address
984be70f0520ec93eef8bcf56c175049d9bf99d771d78fdc0b183abb41519c74
Commitment
baac7f54c27c95fa3b029857674068620fcb630e3d2935de274b20353358630b
Range Proof
672 bytes (Bulletproof)
Memo
1b1411325bb47f110f522e8e154ea2837f79de3e36e878df68559e4a3cbcebe3376492e837ec637688b6120a33faf78a58c548245d8c9f76224570a27722cc60bdd3a266133ccb5a5df56f055b1cbc4202c6f333d299fdd34f7a9c719fed041f26ae5c81421dfc599a45435ba9bf5ad593ff7405df5af8319a6e4f9036b196e7 (encrypted)