# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
f67b72712a096d5f106cad3f08bd48ff83bccaf668256e37a89a018ecff0f463
Pseudo Output
0e6e61ca5adc497f8cf6380c0ee9e15a6b8499ed05a4c0e5c2a299c2d04b0e69
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
2e333a83b4c6519ca0f84f4f98d382ce123000b35eb21fa44d01fbc15e63b66b
Commitment
5eddce63e25c7b5067f350b668275a7493e4355722ca899a057f6a64f97fcd2d
Range Proof
672 bytes (Bulletproof)
Memo
6bd5428993d42a6f23d9fdaf4611d3f422a9f546b308e5c9589a52e197cbb80f984e6c2225e2f0552c5a3e5e37ccaffe4ebd09e9b548ba77efa39f6cb65a274953ba02864ac9a30ea9f2aae5a6e30f77466e4ec1ae2ec5653c9260246261154e1314e3764a1ea2a58900a1d88422bd35fc02daef571241229d4790772fff03e2 (encrypted)
Stealth Address
002d4442dfe27179ce803bf5b63c5ddea55ac8f5bbc429f4b43ad3b6159d3e49
Commitment
70e8f3601da8651e5d0c0c9ac9b7145ff643d72da699fbb7305f25b40524373f
Range Proof
672 bytes (Bulletproof)
Memo
9809aeb2da666b4c13dfaebd553ed905787caceacf7e8285b9ba1150d0d48f126d0ef212e40de630f599d640745908b78a21a6ca7fba7fafd20b870b04d8b84818b9726b413f2e0ab9f050451bbbd42024474c122d6252761c51e4b1605e38dab8f12f93ee6d4542827c59a24b92969c0ad8a3e06304cc2d1a9e613ee8dd2a41 (encrypted)
Stealth Address
d2b5841a116482c510c9f4458f89fa51250f528d2a49d05a908099ec774bde29
Commitment
5c7a36e82ebfd16f66b5183eed3348d627aed1ad7960a08089eab52e1506d912
Range Proof
672 bytes (Bulletproof)
Memo
df1b293ac3f7cf9833da4ef7520e0b981b525520d04937016f5b3b59c8fa2c65e3180ce4b1fed81cab07f11811da275502246e51f26dd6b1fcc05d0239c38bfc66941a1eae8f3a0ad3215a7b755096de8179d7164d38114aea0690e578b7a613a054ddff83312ce3c20210a116a6bb2584b5dff769b26af7b59a377722009b23 (encrypted)