# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
f010d90e5f7fd8e873c76bb61745f61cd3193f69dde51b0893cfc92f42205840
Pseudo Output
ca3cdb6a58100c6b80c9596fe7c64e096d2298e21b35ecf01e6191af1f9f201c
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
f0795ddb7924b2eae1fa43f285e57c1684fb408315a8218b6749266e356d373a
Commitment
002cb38fcc0a088b5a3a67db0fc1faa0089d7b403d26f461d332ad9e296d926d
Range Proof
672 bytes (Bulletproof)
Memo
45f560f888162e8fa80a013f734e176553abe9280171e5b80f294f462edd7930925e4041597779af2e62ff569ced60609284cfb3a644d2b2a813fad3052de1911c257bf547d35e6be8dd0ceb9c6ac73a5a6f8f2313eb0f9f09b235866c8df99152650a403ee1c37843f7ac5979d2139247d9336de2d27c343bd0000a8a907b7d (encrypted)
Stealth Address
bc2c855972227a178fcf9cb479e71937e4e8ba31d46125094183438717ebb355
Commitment
242869f2b60b8d22ad62f1f2e26203da5e66e21bd8cd5739b7fe0a7763f94d14
Range Proof
672 bytes (Bulletproof)
Memo
102e161bfb12902c0000e312d867b91f72680f90d7e6d92c71c069ab5a182cb14fafef41a79553d40e202e0af951e4d2c6f5bdc79fb7924b7cd665edad5fc92e4465a9089d71010be3e42d7267f725b3761216f53d714bae9a05606c929272fdc5e9195d16ff9a2cc67a00a05156a8bdd858e1d90a329ed36d1bba1c2a6210ae (encrypted)
Stealth Address
3cac2a928dae50a7a734ed06e1c1442e98b39647f51fa0fa03ea9e23f0df3738
Commitment
c4cd13ea0327879ec3c8d7f225e28007a2308b8531790c8e324abfac1737704a
Range Proof
672 bytes (Bulletproof)
Memo
bc1a69252f20a35a2ddcc20d8fe3b40d0c2ab6d468afc4c0e47890c62857369396cb1e74740cbf184cfeb5be22d38e2ae3aff795ba5e3e66a93d2b97d149bfbf32fbad7f665628afd5b60ecafee3904b51294150992d71377b0064603b1d0184ecda3cf8c40f98bd6f329caa854fb23cb9d5aaf3f87822d783f462731c5a7e62 (encrypted)