# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
a0dd04c6ef3357e0b7da4e6ed66ee22623e6bce3723e45e0962c194782934f03
Pseudo Output
80fa14341963210eafed438874157b84a64423fbce2e3c0e6014e217de362706
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
74090bab133c95f3b7f5624ab49ed9a7d78c6d9348b517c0888f35a6baf2cc27
Commitment
a0c010bbd36b249303a9e6d8a431fb5cb138a6a7ad079de4d8b03ce7ce07791d
Range Proof
672 bytes (Bulletproof)
Memo
83117f5bc69a9e8bc7749b4354eec1e2787dad294c4073e0eb6e44b8d0696a38092fecc538441f4d01f0f0e7613e28178a84fedeaa59b104310f6b77f83ecaa8e270b90ea2ce4af0a0f49bd21022e05701243c9609e496381b083d9f7df4b36a5e0d8f17f26935badcc135c65c4564c29a9fc6f24d744fd1f01765b02735ca5f (encrypted)
Stealth Address
96cf9ceb4ad5f9ee2729ccf2f2e4d4dae66c0370e1971b5a2c230effac0c2962
Commitment
228d9a67757bf779cb1223c8c350963144c1531f32dbae402229bde04a1b5025
Range Proof
672 bytes (Bulletproof)
Memo
73d4ff90d2468ca6cd25403868414f5f82ac5c7a2d83f04f656a3cc7f61ed96ceddbdc3cf5da74fc72006b0f3afa60f5b84b7d20a82100c7274d3b6eb092c857bcf7eb573d55fc70b5cce5775141f18b3d363a68e6c869d618b1d0d13fccbe42168197251ffd4a8085184d6fd7914380f2f6776ff2455fc421b0484ec7847eaa (encrypted)
Stealth Address
22bedb7513125307cc6fd271aae8e5fec567d1443a78770ee43b041c3f74f635
Commitment
def5c2f13acf3d628515a3345643cd7ba0c2c8a5f4956236dead01f1baee207a
Range Proof
672 bytes (Bulletproof)
Memo
f4bae9874664b65ddc22ebae7b290611acb78ac0fcfdb3a0fd1566ae0f3b3f8ad0d42783228004def818fd9d08e40cb02dc131a41b4331f1ef0b81dbd435c51c526f7d60b214807a2d54698edd8e06e02d93de9c1f7ea7bca8db8e2fc054a4599c6d92a26bbcbcc17386a03de88da8712356c46bf2b5eab5b6fdebf9503a7580 (encrypted)