# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
507626bca3f1c38f07e32124cb7a30cdb96dcf914d37a882db9f560c53623501
Pseudo Output
2627c4e613c054c8233d20f602357f23dbe064c963d377903d7b34ef0cdb8516
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
faae6203ba55b214aef07027da90a6da5a0f946d57b331ff742a26af36a6f502
Commitment
a23ca14f6c3fcc4b0c7bcab9ae693201410af10044a6176a272c5773f224f134
Range Proof
672 bytes (Bulletproof)
Memo
2e3e8489b6a326f7a94ead2e825b1932b21cbd7fe27f7f58642e586a92050a3eb2d73db721170139fe4ea0c57dfd73fdae755faad58bccab041592a46a8e3b461cc655e58d8f4b7105bf9cf7cef262ff386e906b711d21cbd967fe516629e68642ae5640614f313e9feb0d3dfe83ff1ffea5f5df1d0736927137e4bd716c0525 (encrypted)
Stealth Address
304749556209574f217e9ce8ae36481e1c29d693de933a1b08aa0f00a47fd226
Commitment
669bb2260842eac49a37e1503dedb3d1e0d1507df8169a85543b9f44118c760c
Range Proof
672 bytes (Bulletproof)
Memo
672b0ee43981d6859c0ad24d7c990f36907bba921bd419d900e782d27df78ef19ad3b69455df05552316af72f86f38a9022bb0e11f47c35e3f93145f1b9d95dba43aaaa534e3c77b7432dc85c1585d2a7812853fc011b49ed353458e9aced6ac8320cfdff18c35f140face40357fdf7b7796c21fd4e79ccf81faec901a176603 (encrypted)
Stealth Address
96f249d774ea448bd7ac53442356344ca50fc54e54d7f68aa0676f0da099f94d
Commitment
a86f68d880508d0686586a61b73bc1f1d247216398104dbf6f9fef37932fdb1c
Range Proof
672 bytes (Bulletproof)
Memo
47693573cd3f075b7eab6bc353854779597130a5425604a420ad602a8c98fd9cb93705d8edd66c0e2c9cec9fb6b9aca760eae7997e1d9f6264c900a28332bc7f4ef47f3ae5db336643964bb4efab3ac4d435e8ce341ad53a7291885a605ce6b34308fc601c775fd5d9de2c0d8f852c303a0c9c55e17a064bf54814aa8f556d33 (encrypted)