# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
283847ec5543ff59716ff0d41ec986c53b7502871395b324341901822b5b2d6f
Pseudo Output
b0cb355f6530b9d63d2d47c89e8ed1b94e927402745dd47aebfaee4b96fd0e04
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
6247adbe7f92cfd2b1598129876dcda1265b4a67474efdba2f06c5728fd30b1d
Commitment
141e1098226cc6908f4f710fbb84c123e0cb8cfc6412fe520a339db4b359b051
Range Proof
672 bytes (Bulletproof)
Memo
4e3d8d9d095d6056e51ffe23996aa95011827d4cf37e3ac9dca12770b52217787eb997961214fd687157cd1850fb35ec841e5104285926d255038eae2f1e393fd935d01a9d1bcfbaacc873941e3b3290450442fa1ebbc89781c4db27cef657ea549f1eb5bb78fe23ca18a701802218a2ec8b552613b02094023ab47fcd9311cd (encrypted)
Stealth Address
c012953e494f821fb3dd759ce8297f7ed558a92057fb902568bca71cf6868540
Commitment
a094b1fe943d3ec944ba73bb6c910d13b6e35e4dd20d3dd9a713285d0a24fd7d
Range Proof
672 bytes (Bulletproof)
Memo
20a30297a0a076e9e8e88ba83da3640d78417c62527f4e5ae6dc7c74b83d091107f475b5daa507e42ca83ce28f7d216b29c4b667bc23acd2f96e6e90c1716af23b13f6e760f8affae4842249ee4781ee4871e038d986b2c05f2e9454e6337306a84d7811fe003fe5786eb51e8f3467db7baffb8bf74b0ba06036e8e42171a46a (encrypted)
Stealth Address
f2ba80d9b0c07e9fff7dca4950e1673d77139b83d9c16fb4c1217cc6f521137a
Commitment
98e8f2efe626a14ffca7b9272e8988df884b39e95b486cff63e90fd5edbbe342
Range Proof
672 bytes (Bulletproof)
Memo
588ec2fb5b141ebeb203d5e0c8ec5e85bd84fe84309673c60bd721c787c1cc66b082227127e508851a7b9f56b577361ce6479465355dc57312854236e9fa849569079ff0330e32590557015ae5f2d23d26592582f200a0045874e8ab7409f4ea55b8c05244a8db69fdb75e2d8caf086c13031902e0a956fe03f22ceaa48f49a8 (encrypted)