# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
3ee18d4bd24f4f76ecfe33bfc9bb0b3acd6881dcd994a2fdd61505fb6c463123
Pseudo Output
d6ea68cfa21568d9ec246123b808cc9ae2eb920a8db2022707996e01159ce237
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
02bf91011cfab1d0c27a5b153fd16a58891a82b16905eb3e475eb4dcb7c93b75
Commitment
20ed7fd444df458eebd4229e2a839d5f4ad10aed084938897f6240c89aa27921
Range Proof
672 bytes (Bulletproof)
Memo
bf8f5a04947d7d94dbf6532d1b3a5d8d7ceb79a57e2c3a16771901e022af275a44526ec6b2f8d341f30b737177c1f9dd0d4822ca9d6df97a2b7aa9dabbc0be96878b30e279aa654a44e5fa4a278f9ecb7e8cb20da9cfc4fb8f4122caedf001667d883597639ba21f4cdcf47e0c088e365a636fb2465922b64f9869dbdb3be751 (encrypted)
Stealth Address
448397a0e8316f923861e1240ec46983abfe3541f09fcbbc66a72279a1207522
Commitment
deb64d795a93c34b1ecad1bc8d6f90d1e29d4adea54de191ea3ddd77269dc45a
Range Proof
672 bytes (Bulletproof)
Memo
d225c2824a8fd42de3f90d251c0bd58e43f2edf1b1e1c138abc3d011f9f3791fec658c01e8d25655eba3ea4bf4093206a646219daeb6e70a6998160a1616f5700de0c202190cae3f6ae2acede9dc2aee93ba320f2ee2bfb2ca234beafc2c20aeb8f5bb5f079b62165338ca720b434691d6ed1d208fbe69644a26a67476f41f67 (encrypted)
Stealth Address
ba6b84cf4b23d2b14c87725103b474c5a98e679c358dd0157680317d4c90552f
Commitment
aeb48b25b0ca02389a59f333323e2888ca7e09949e6718a8d005aa0a7d447269
Range Proof
672 bytes (Bulletproof)
Memo
c6bd79c7c2c2bd132ff283231a17004641cafdcac43e048283507c470683a51427def9920106ee0f951ce1a137d86a1a5ff66be6febd6fcfdd91dfbb1e813fcca0d4b65546e18ad7b5075da01cf2331cc8e7e58c41116019a879a555ea875cd24b339543430f2775ab4656a10b98abe71f8666ed329dde68604d8361938edab5 (encrypted)