# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
225c6e27181363f75b4a0ef2b152f34eb34bee6e2ffa7556c60b991763720623
Pseudo Output
c85220cb6e77eac17b7d6c60789ac579af0ac9eceaa0f78e7222141b09420909
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
1ea32117eb54e1cd8f09f7679bd8b09883beaee615bcca557b2e76070cff0913
Commitment
181876b87bf985e8cc43a148d9ed8e5914f0062a234c6bd1acf898addd22e017
Range Proof
672 bytes (Bulletproof)
Memo
3bf27fe63226f7176154e7cd7910455617ae8cd46657cfa6ad4c84f474170a4f247cf4d6a4135268d87607a9ed4bfb1d79ace20c7fa3e79de366a74e907311f76c3f3d2099b70123d07407266ccfafe046655894c4489bf7c9f4911f7d181df46f6cdbd1f0da776910f6165f7fcda41df28a84343b7cf22c274ad32b0e6ac625 (encrypted)
Stealth Address
f66af76651b6a18330523bfafe225637c215ba1e33ecfd15047ac4af15601457
Commitment
ee0629f5fd69a071b66dfa8518913bc25e5cd9578fcd0021b236f6e91384f246
Range Proof
672 bytes (Bulletproof)
Memo
bc3a44b185b8c1ba01f33bd3c37f0f1f0bdabc6132e69c8ad1b2eea601221ae080b34878cdcc217a6eb4c161863a04ceeda6ae7a310c75ee20340a2e384402652e6e4dc3b325b61dd85b1a8a5d768692ca38d23cf7e2a44e4c9f21156248a187e26f2d58ea382e1cf9549a97a20acbe96da41349c8fd6fe6c6d8e260c1feaff5 (encrypted)
Stealth Address
5835f461d86afb880ba7e47e2d63ce8a804031330108c534359ea8917f828c79
Commitment
b872df6aac07f110840b8a47bfb6b71becc701dd3d239f4b8fecc54192793908
Range Proof
672 bytes (Bulletproof)
Memo
abbce31f4cdb172470189f2bb31aa27ecb35b78fe4bb60fbda6c8eadeafdb1aa349a14922a32e97f77159b860752b3c2445802d6e4f5f43809673e51933c5bc37c501f92b75549c39d52e476b637169ed9a7cbda4540385522a557bdb7ed684b3bacd5f3695de9bc7f19ebef317053bf3fe7420a0b1d32f7aaaff66e8b621ef6 (encrypted)