# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
ec55b2cbc3a2f5d818d0f97c8f896716468c17fd67b6e085ee2e555723ca933a
Pseudo Output
480616e2ed34bdde927771f6850a4e3c49e04ab248b46e495b42d8c6f08ab20d
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
1cbe8dbc28892ab5f57364780bf8e8f0e5370112dc7071015fdfe2ed887b663b
Commitment
302127230fd9c1de3e2c21e4b9cb1d2a6b0b0e4796fb00a592f2a086e8385f23
Range Proof
672 bytes (Bulletproof)
Memo
c822497682e0f8b149d93458dfd118841c0c90a9fdde277e2cfc7f50e5f10c6ad3b0978585caee9185d4cca87619b650a6d65bcfc962f37713fc67164d7824f37abd33e19ee71a18aea00086adccc3b6861286fa4ed458df2fd15b82ce5853432694aa28f044c32641b452cf2902873da83954a8c78d6c4e9589ba4b2e9490a0 (encrypted)
Stealth Address
6ce241e4176429dbc0d4010a87d99ba25fe0af7c732eccf832fce318bfed9710
Commitment
08ae5d86d17ce67382067b5d56c423b69b3ba09e62bb02dc84bdb352a9a49402
Range Proof
672 bytes (Bulletproof)
Memo
ed590afea6a645c41ebbf4ad32110616cc4007f88896b3f933cdcc759f953ffee500edd5b56cd0c41f41fcdc0d5c038b2166b93934c881e5aac021711bc49fa8690b98f692ec15a2c18933d6e6ffcb6aa77a5e4b73cefcca458fef736034a52f36ce3174b64d7d9d5852b9974ae9d013d3c42c8901ad4d74aa7c9f84d127617e (encrypted)
Stealth Address
5c87921681c6d677ec15b91b0bb3708fbdeddec42543c7508c65d5eaf9564b41
Commitment
b00efdd2b62926533095607c7bcd9a8501e659a2434ac0bef72e67be2a708363
Range Proof
672 bytes (Bulletproof)
Memo
a5f99a9a3925db170bc468afdd932a29ebb9456960684a51d03c2ffe79e8d86060165affed96e82bcec8282fdf96564609bce1d2bc54acdb746c6ca5d38a69d589ca952a0723ac21f9a7243d0201fb2935076cfa7f725c65f241acf07c14ab52abe06a17e30a30f0f23948c54a306c6a3dbbc3c07cda12e12dbe79282f6b18dc (encrypted)