# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
d8a249c694017b1f7ccb9e068d382f5d9b66ded87675e5818ba5f67467b72064
Pseudo Output
1e14c85a54da78f28bd8b03adbffcb61fd8acd6f63617afe650d41982e314473
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
b2391553c1ea3db2f13fdc85502abb69ba3dfe80f94aff3f9b6d13774d54cf0b
Commitment
60fc6c61660e4c7ff9b95baccb22a4da99ea43216d906922c934995b0fcfd15e
Range Proof
672 bytes (Bulletproof)
Memo
fc4ebb8a3f12f91720de896066ce4d6b745fc7201796f9c9b6653ef8626eb6228be71620b368c42cf619f0c13f6d6733b5d1bb2a2fb52b952af326d76261e4a095cb0d626aa6870f3ffda6d679e6c815b5be43f0342b7d0b540f9d058e97dd10aa371d226f5b367a2b0b58bbf9a7a854989aec1f8cd23a3be5cee3b3462c86bf (encrypted)
Stealth Address
22487c85967b243eb78aadcd757b7ea55a0791f91af78ae50e757f37d62a8238
Commitment
e8a9e386bdd967f4ca1b783635de2e3102d08faa2727e4c76e247c9e8822e233
Range Proof
672 bytes (Bulletproof)
Memo
d7b179d2c256f688dca8772e2aae23990e68a2d71c5ff1eccda5ea7eb87c940655390f49f5e702ee77df7fff0d88d503e23234b6e3a24965688626a1ea8f2d3dde6830c94999c705d296299a65e70fe1640fa9df69c105c238e04bf50b44f60e54d8049393fefdad392108b2663f8279a0c6ae225e7fb3eb9148c655ef2d8cc4 (encrypted)
Stealth Address
40bef82f0b4fce9f28cc590a048c295ecf7976d7bb775f3a3b40362f9235f553
Commitment
a0086aa782f3d6171026d4047565ed1161ec2601a6800a1fb544a2f8f632557a
Range Proof
672 bytes (Bulletproof)
Memo
a8ff7cfa032baf37372cd844f571f5a810a892584a0eeb3f379fbe85ca1979c0c491d6af74cf6776f3705d54b21493b58d17a79aa33d27b919ef1dc3fab1b849226561b516d31e6d50ac385ce8a4b0050748001241ad05b33fa522e64e9a1e59c0afe57ea42750b012eeb62e7d87c5e96d61c4ca0e6c414f07babb1b814a4393 (encrypted)