# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
244581970e15989a31b66b3cfd7d526f0a0cbbcbc31f17ac2813d5783fe7f86b
Pseudo Output
58d32d07b1b1081e838de7cc51f2dd8051b8a6bfb06d30fccdb2c420e8c85611
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
b8c90fb7e48e2c42a235b32afd60fefc07b6638ab22a6ee9228ef26965a61f1b
Commitment
3cf9a48ab9c86d3649f84d29b934cfd0cb01cf7d0910a7b390bd7f3d7b421820
Range Proof
672 bytes (Bulletproof)
Memo
ac51e231473ba13ea33af0d8a5db3b9a28c8fc7fa6597592b0faf552e0c60e4034352c517c612edb8fc3659215a4f3285d652f08d30b2fd0997affe240b724bd227def205d57a4ce7f09429f70690acc212bab34cd5ffda1665a12fe10bb38f1ef014ab7e5f45c64ae0c11c8d7854c090ea780cd8f9c86a27a6ae58268a00c90 (encrypted)
Stealth Address
3819e324cb9b0ed8f560d7e62ccb555105e2670413f52569a4acf98555040634
Commitment
d89eec080a827bd990957bcad2ec6411eb95decda9f78efc9f72975a8e62f364
Range Proof
672 bytes (Bulletproof)
Memo
89938380375020ffbc64f031a97e289502d8b902dd6eea94fa925818cab52821b9bd90936c65d0c63ae5e1ee4ff8226613a51e3d97affa5c17377f156ce7c58fe462220c41e5b01251c16bec10b00ecefd49f450af9cbe429f190d7518039532d6d4e0fbcae3c2fdb5ecc6b5c64ea28310b48b0467461c43a4a2ec93a893cf98 (encrypted)
Stealth Address
e84a07b14721e6052958be4f34615c4142da7574cc021c3174253ee0f278d876
Commitment
22669cfefcf7b50512816cf41fa4b612da4b9e3b9469315b890a68c374656f78
Range Proof
672 bytes (Bulletproof)
Memo
9be54d994df0d27d7e327fb749451f2b1066aa897a481a51501130eca56d86df02178b96e1947d75a16cbc272771e4fb8149960760f63c7a93ad84c4d268b98d3b6eb7e2db937ee08f85b1ae1e24c9f872df5699fb636554314d6cd5bddebe1e1372fc0f917b7dd243ee813ce6681f24d6d97825f6faf33ed3a21789edeb8b49 (encrypted)