# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
fcda9591984e6ea2015416207a9b481c908f56e0cad9227862e146d38db2c167
Pseudo Output
e81bd7b76ad703941469648cf68b872449c631c237f870541cf1f0d5812ae047
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
ec44c92c3e6f703a8a1e8cfa1d826d0022dab66ce1d8ba45840cf9fcc632a727
Commitment
9258c55b7f0d6c335b239588b1b3bc18aa4f2e16e170e9a4ca4ad9ba280e3552
Range Proof
672 bytes (Bulletproof)
Memo
ae7eb20bbd0ce280c8027f0b0328bfcae10afc1bb3e4b2ff15e369a036ea6059e076d2d23059ff44d834b45a434030c66017211e76a197523634fb6930051600dcb97a2b73c8b847d70f04f02aa3a472470c42d9e295634396743005dca87cbd88e4deb8b356ecbb54d3a09887631936ecc9737be4f3732d3f9ec7e804fe8773 (encrypted)
Stealth Address
128566bacac13ce07c4659de8354572084d6f83e4d027d1d5b0b595909512374
Commitment
1873969e1fce8dfdd7bdd248fec5dce0f0346213de35023b8a720eddd6d3f635
Range Proof
672 bytes (Bulletproof)
Memo
c351f64bf0072b2ecd5a0268161940cddccb627e56e9326f9e5cc231f8932925143da186546986c304a71b5abc34e1de14960691b2057525b72765130695bbb5befd27500fd7f9612f6ba39c95c20910365e28ef9099f90c22f244b58a7de5a9ad3a0c97d08bf5aeca24861f0901722082cbe7f1524bc243f9b8334e14f1d831 (encrypted)
Stealth Address
fc30852a9d2dee1d14ff09cd08b1d9ba1947220f97035d60006e58e62a6f3f3d
Commitment
3862d2a39f6c987355cd66498c4300c147aa3ff60a4fd249a13d2f15dd83f466
Range Proof
672 bytes (Bulletproof)
Memo
e1f4ea59c9d6d5713586f8f7f2471e54914f35e6355a86eed44e701b268323258dc895cf7bd2e437ae53bfd4a0f6534f6e7e27e88b5a9a2064eddfbba74db372f4f0b05205d99bed44b33cb66268f0384fa90ab753abb5e395f16413688c535382dbd4f7ba82bdd398934d250647b69877fbfd07429f2cf6c5cd14fd53de6282 (encrypted)