# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
7cecffe5f20a92bd764e170d4cd0f0882ea80bbaaa9f07cb1b9bbb6a9193d81a
Pseudo Output
c03aede85221db6a80318fd02cc1821a073d552c22b388c5b4268a8cdb638d7b
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
b8a601fd87b4f8be8f3e8e1b647cb20e5c8fa4a8d49b0a97bb17d93874b18854
Commitment
52d2c94eb38c16be249f480647007f01ee07569fde26d33e38e4e263d3d9665c
Range Proof
672 bytes (Bulletproof)
Memo
e67e5d50574162b2030a1fad0c1d384487b3ff38ab15777b8d41f248e5f33b998b0a558ee19821ea10d8dbc1f2d2eb19b2e958cb641a8fda981ed1ddb8bb1d544c9e8ba7dad08ff117ed4439ee148a181a2bbfe14c157b2208c79b91935db997b88fcca7f6f21164a3837ab993c9e90a308c4b4d27f6170d6316e0e3319f5d59 (encrypted)
Stealth Address
bcea7179c967757cd3dad1fa3356732c364237c92716889e006c6b1fee29a175
Commitment
f2b777923be468ab220845555d3c067f9c347fff64baeaaec18a105482b9ee54
Range Proof
672 bytes (Bulletproof)
Memo
7c03a0333ce75e00fe01139f37473551359baefd495735045f6cee5278282db71c372eb4c85c580e94fb0560a8fbcf5ebb66343a05f54b0ac5dbc1bfa25cb428c97c4e6d3eef4fd1c93a69af4dcbf4a2c10c75495616e8a77cd36562cce842e33b3bf54baded8b9efb46d8991a3758f786fd6bb889aefdad3bf8f85b17be0a4a (encrypted)
Stealth Address
70301f7618e18a597768705a3763f63898649be1ef42f6574963b46b85d9547b
Commitment
7aad2429b1dd7b2bcb10221af42daf92f3b467a95eb7f6de7e95fb5b4852261f
Range Proof
672 bytes (Bulletproof)
Memo
2bbb2ae396739766ff3a2fc8cdf48f907c4d5b586e779494b4b83778022a1f4003a52ddd1dcc670e2583b793c1ebc34c9c99614cc3bf5a90f0f4b0653a19444e995b8adc699f054c919a653ff934d262c2d4923dfd86bfd5201412ec419122d0dd8ea1c1ebf1920f90b61766add5f9e3e3be3ab6acbe0d47f241f1130bac1e74 (encrypted)