# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
2afb796825e41dcda946bd4be0efbf2e8c2309a855949dcc8460f523daba4928
Pseudo Output
eabbf6467a464a83e2edd11d3af38acbae5a6ce4a3c4c643cce51f4cb5c86b67
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
667a59f6d7e910d9c3c6d06997972d6ff00d3493e6e8712743b073c554221418
Commitment
e4cfb1890b57c138fa9fe1a581be5e0112ab47c9949a27a622daeb78e9bb3639
Range Proof
672 bytes (Bulletproof)
Memo
89b1993d9130b1d2880ed5839579804688798646c75f5600ab7997ebfe27e2dd048efed9e8eebf8b6e23e56b728e2da4749a5e1c7d5e55f7ed0b663f96244945837256e26fded2203e703fbc77974fdb1dd0f9e3df8cd3bae44de092e28e3b84805a60f79d3011a80b07d4f42628bac66bc6f8657c6db97ecae22d265bb76d67 (encrypted)
Stealth Address
b22cee2ef6db07c79a4b5ef7351e44f99b80d4a3263b0559ce596fa558360d18
Commitment
da361ea365d3a3289797ba31385df7046783efb9017796b48dc66e008ef24b1e
Range Proof
672 bytes (Bulletproof)
Memo
85ab6a3a0af68ef6d876001734a37ab256f8724e55937da6812b40ce61fd8535233f1a1c0d0797db9d2e1747a7b519f5108b5013e57d42c0fc99e7b85b4470a0757f980b350cd73f7f464549767e60f7f080768c929b0548127ac5968c966d650f9017418f5b1c53641b5b9e8ee3f388adec9c642bc1a62dc519c380ad11e564 (encrypted)
Stealth Address
f82b9222bf3c3385e136cce904cfa2787557f73ec034ea41e0e8e12ed2394169
Commitment
ea4e4ee5d4d88235e0e447f46d70b2b7f143e0beda83f5eaa43e140f5401b114
Range Proof
672 bytes (Bulletproof)
Memo
a24dc9910d3cc453f06b98c3d7608c6c6344d91ca900760f3c89f249a7e82374ed3a2a01835d71704c756697a926470f54084fbf980fafe4d1694873b814f7cc260665d9b41ba4e151649ac9fd0639b20aeae211d6c85ddec6e028dd88c813bdec3378d751fd3b4e5d1ce3ab485c2a4bb639b96c4b8bb8481480e4dca6e0b105 (encrypted)