# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
a0a81e15071f75183ef7871736af74ff1e3325b653dd32f8c9d89ba6e0b0f268
Pseudo Output
78f75ab4591746ae97b294323601d9240943562b315060a6cb2daa1c7bc90201
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
b0c2305f8c6e7c108a81c24addcf7e3922658b95b727b237cbad20d72e8f4704
Commitment
c859ddb353561c842ed0bfccd4c071866e0fbfd3cc8ed2fc85cd81f350955b71
Range Proof
672 bytes (Bulletproof)
Memo
5255a5d414c68b8f3d7a1ab442ba7372613a5dfad7b5affddb7cae8121953083f28eaec9db104f063beebd6e0eeef4d48673fa4b5d65165860301e8f405237f9766394515367e710072be0c8f5d6467eaba1a087e0be79494fbbfed14469d02395091286e1523f637766d78e0f3f4b630783a4236977bc41cb22a31e307ea963 (encrypted)
Stealth Address
8c7fc90490df6fbe324fc92bf0f3620c408be4cce2037de50363a8d10d58cd36
Commitment
d2d416036d8876b51f51664e0ac0d2cf4e6db1802493f027276f802d4dec3b40
Range Proof
672 bytes (Bulletproof)
Memo
3eaf2d46301b90accdae7f0b81364c191f498376a9fa01b967e808ab9854d5dd341d142ff8da6a3c0c179b5b6f9abd09705cf2ad6702cba98684f34aa556dcbc8dabc02abcb1b782ec4b7cf6eedb7aceb5e6d2d10021bf89b0e9329ada5ae229a7894e59f1387fbcb2c40bc76b4c9c06589ba5ffbb9a61a17d17a2eae5d7d75f (encrypted)
Stealth Address
142d0bce3197d99f99901b55302fac361fd1549895ba2122da7b41b0e3175b28
Commitment
0eb25b570bbbe429066dc2a06782c3d856318a65e9587227698baf32d2c6c532
Range Proof
672 bytes (Bulletproof)
Memo
e5d0556b62db3dc16347e90a03395d8f3a97e258f921be043b847b960bc2392d6d098ba3f25fae60a6187f041815121d9ea189fda58b85c7bd5371199c1c13162719a33640db9439d6544754b8061e1ce94db781d7079601a1aeb40e12f23044c6f7204d6fb15f49cdef2317974ab270418cf17a32583b5b25939f98a17abfc4 (encrypted)