# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
14416fc8859862729dcf3abbc72bc456feb1a0a08a0e62932c63b8ec2876126f
Pseudo Output
d2c246425dadaeb27e13f9cc1af1e31085ddf96891d02346caf98849c4a0523d
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
c6ff8830659aba44be3d5f36e8d5576e953fa41c985d0bba46cf270ed7a9b96a
Commitment
b281ef9df26be277745abe838d0f03f7e9fbdbbe56d4109f892dfbf4c6470007
Range Proof
672 bytes (Bulletproof)
Memo
49b4c116b5a3efefebeaa4c57f8e3daed186164bc819fe45b3898113c2be4121ef316ea0f231677e5c3a6d717c77dcea4261e91210f30208d99682a6e60d374717215d755f5421bbab3def57ad29ae8ef8b27b391a23a6e48b59bea633e759a077d773877845fc4fdcbb27ecd7243f5c306b042827de41cefd939515338b311c (encrypted)
Stealth Address
b2702470ec4e27abea8c6e23ecca582eaaa1bfc75f47ee2dae749a9e0972ca55
Commitment
12e8e649a444d2645d82ebbfb29dfd4e88b24f41d424c98759b90080a183993e
Range Proof
672 bytes (Bulletproof)
Memo
e39be668eb2c4307d8d1c9b9893ec05b012d2d0572c867f01c60fc7781738882cc94eaf564b9d1620b97835abc90cf21f9fd66dac3215c15ca72d11406ae2b9b4b36bea40b1fa613576a18725e3078b76eed8324074958b6483ebcffd338c58c0501cc0955ac244567ffb46a08cdf6eb40715d7d2a1672e6248145ec46ecffe6 (encrypted)
Stealth Address
a85145cdff85530ca2610c0f7b6aa606c2099b45f34555b878a824f6d9f67072
Commitment
426b88c98e1327cb01255ce15bdd6e7a37fcc903c58b780a98e97b3a30058324
Range Proof
672 bytes (Bulletproof)
Memo
0d3018c794022920bb394f4ea04a48f23386c860f484c943a30f39f026c639b3055f66362f2ddf285e64f912772c31d27619e89d8d677349bbba09af1d97523794fbba4e10627690aa28ba8da950c8a8e2b538980d484ff0c6270b83dae34671d8d462a5798eb3b2af5d0cb81edf5a4d9fbef7498058ccee537849b28fa6cefc (encrypted)