# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
e0e793735468eaffb9dad9c2f195f233aaab549774564fa563fc32bc2507f709
Pseudo Output
96669947e4d3e52c741d6163f6b8203cc67444a1f5bedb2abccf1b35d64f4d42
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
2c1675d99c2c5f8ad3d0ef38d22e5391215fb6817768ca6a9dbcb3398777732a
Commitment
c2e7830f3ab6a6646f3f82725ebd840b190575bd94e4652638cd9e172563f62f
Range Proof
672 bytes (Bulletproof)
Memo
e66a02df082e4e641b7ee32d84c54584dd2f1d0bfcd8c1b3b3cd059bcee025058904bf3f7a7edf01f5f822d3eef4ba9226d18b0e35368c700fba91ab84df1197d1523269d312150bb6dd5862e94d527242a92d28b504ee22efe238c6d33a0fca027c5f264d78da7d8f4cf0947bb9e4ba8d2a2e76aef58affe0d3bd8ef120886a (encrypted)
Stealth Address
9c6b4278084f467765b04daa7b9edcd24f08adbc2b180db930a4b7dfc135e14c
Commitment
1e826d64f907cb1f45e67a9ab36c309b64c4ac171bb3d1bb5a22021601d12448
Range Proof
672 bytes (Bulletproof)
Memo
0ffc4531d91dbaa089fff392bd9a9174580dfc4f05fbcee5f01aa271ad1fa1e0e85a1d36da563d79660eb6975e31573849574b04d4d26f5ebb6ef5a089b2841932aa3b2c9ea523844f3919f603c608705d166ed2eb3c967f05ff60247c3a6a1cda67a8ff0379a2d9b734055ee85e346b8b21e5139064e15465556260e2f0ccc1 (encrypted)
Stealth Address
22925f2da438fb8b69a3d5ab90a31f540673a7f1f9621883c0a20888be862a5e
Commitment
d8904a241cb9474516c34e0313b744ee99aef808979d203d315a1920a0759f5b
Range Proof
672 bytes (Bulletproof)
Memo
ecc74660e7902fb7526840caaf2bb8919627feb7e93ab745948a7278814853087d5da7716114298e4c792fd0a17cf0243d0e6cc206315386ac6c6d2a09d6de1a0c68397362b382fda4714171c1de4e24b379c13c12721cd2ab9e547177c41a06717d45e48bff9b8639fd2c6af67674370c8e812324e6407c8c91289ac597447a (encrypted)