# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
e4fe61adefa3f6215cbd60d008c69a526dc3860048f5a82e639d96d3b240a277
Pseudo Output
6c8fe6d145925fa701202d57da4c6da3e3f503e2a4f06708171361369ebf0053
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
247d5bedfe3e67aca0d9231d31b994172e68b743b1192ebc3cadb1202e352f04
Commitment
9ccdeebf1a50224fcf07271466652e9c75ca1170925d6de37659404104c22951
Range Proof
672 bytes (Bulletproof)
Memo
a6d61c24086e2bc01a5fa38857edcdb79022d823920df270535c69865d3aac2274160ed9da1af8a781faa573176816a262c53b7d996b1c615e392d0ee3c6d31f833f59199c1b5aadd4c49cc261740f331d7812afc726d6cc443db714df70b59d7666c52382e709b0f662a87e719adf18fc563d0c70a47835f6e0f6012bbf64fe (encrypted)
Stealth Address
64e5d8fa652b5f5cab244bed2bad57c402632202fe734e8b41f24fb32835ed6b
Commitment
8827f24dd261739a20b913bde7f01581ec0cced9eb6aaaef4770a73695236935
Range Proof
672 bytes (Bulletproof)
Memo
b87075d6c966b02691a57dd02b1d3d697883967922ad19adeb84d0479ffb33cb58a2d33b65ab17196763f5c1570a7a53b4faae7d4553bb14adb339d520d82372bc8d9f861f3a0b5ead45f16da680a34d1b00f74929dfd486668f876153315f2005c52220c4c2c08d9a7b6383b6668f87114b91ba0044bc3c97884ee6853c5543 (encrypted)
Stealth Address
a85810049e67ef5069288ee74a5c31eb1abd5af1d1a95096dc80c8e5b67bc121
Commitment
f418e673b212d7c57d4974a047d788e24734eba8a726c888bb837027c18dd861
Range Proof
672 bytes (Bulletproof)
Memo
e0914c35985ed25d46299187d0cc75ffcc35207c903b9529b3c4f3e6ee901e4800bbaa0968b880983cc40a939c8ffd8545443d944356668a592659b2be5cf68c49933ad4c0b7bc1baeda8cf8e7758550f794d8a9955d01554d1a819ec8a04eec2e39d8810296c2d80c8dd015a01365acada30a0e941597499fe78023002ec095 (encrypted)