# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
9a04ff56ca5cb5defa84875b0b9cf231f4b0509077750a4db1b7b71f6757a958
Pseudo Output
0aa53089e6665914aeaea0a72f48fb039cb8b3d592f196eb34f3bd4cf42e3d2f
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
b8a111601ca68871caacbb0044b974d13f2acc37a245e0f96f102a3c305d9f6e
Commitment
9c3b9f34dc28c1f6368b0cd85a71177215c76b995dcccd997373a5e810781e1f
Range Proof
672 bytes (Bulletproof)
Memo
378ef1b99e5be480081a78322f6abbd08cb468017c707b48f68bfcfd964d767a56028887cb19fb6eb99b4429018d0c10eb8f6e985b7b7fe4b7b5677bddccf13a6a8870091a1c3a6eb0fd0675069d4ab237b06e915c9f0f919aa28465cb18e21650d693bab516e5e4171cfdc5ca87f5cf53308a21418057207b13ca606f254f0f (encrypted)
Stealth Address
641b169aa8a255ca5ee43bc464305ac43d8b89f995ef5a856b462c7079c8d33e
Commitment
3e8734f6feb167a8bacea5d05b171de03e023c103ec1142a8b7d267951dc5832
Range Proof
672 bytes (Bulletproof)
Memo
aef92a940f0f794abe20aa30a7599d5eb7290a745de6cefb1d7df5342d40a3e0cdfe0520cf32a8dfa90a234e02518e59d9a23fc2089983ab8730276f80bc464c843c80b39eeb4ec6df473fd43611f85dcc6b7d46dba91a6838aa9554b5de54b51205df4f7ee398bb2358cf10fa5dc72abf2f82a35a620a8405747f2666e84d9c (encrypted)
Stealth Address
a0feec4bd306d2210a2699ce49afda86eed97eed3f687eca93d914730b0eca09
Commitment
e2cbfaed76fbe6d5330ee03252d040f3fa5d9dfba2286495bceb2c86ae6d2b00
Range Proof
672 bytes (Bulletproof)
Memo
56ddc06ad81573f5a774c509068ecd13eff4bdf78ecad0aa95dbce32b268f22284cef13285dc76d1d8455317cafb051b2d9fbd2e083c5107bdb08d9775dfb68f5d30590a79187d2d3dbe16bdcda2e9f09195cb4270492366fe992af05af800acba2771644e6f273e87c38c2180102e392ac77ba22b7711880e8cce7d8404abe7 (encrypted)