# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
bc4c548ee9ebdb08081c2ff450a55f90fe2b60283b99867cc6a9fce24bff1246
Pseudo Output
94d5c96cc736c81118b31996c2169e2fb663592a03b303aac42ed2549bd2005d
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
2ed149f8f1694e12ad998fb617842cde81423c4e84c17a8700471505527b8d72
Commitment
86df12b44f47a69af19a74e2790c7e6aea11e29cf4a2f9ae840132bb6ef7c964
Range Proof
672 bytes (Bulletproof)
Memo
f2084f7a081feea9e07b3dd841f685380e7bf09aac272458931635cc35aec11d493cf74534b2c7b97d1f0bff4f59fc6903f3e66305b472516247425cd9aa025d2ad4db0acd23048b67df2867e7e39d3daed5549b39d757c32f37544f17aa818e3588e067431a2d8c0991ca0ac5544af6a2ecfbf9cc672a8226e0f0c37727db60 (encrypted)
Stealth Address
e8730e730ae4fb773805e69e17e5c766adc568a86dcbbed48cf5b9de73d0ba3a
Commitment
e43a8bdb8478147011e186e92307087f90fb3e33a3e0a0acfea73ec35e57d707
Range Proof
672 bytes (Bulletproof)
Memo
59164ff7e17199570df9ad917614d9b3034f5142cd0d1e63ec0d74d4430773d779fb4c81adfbefc92483885bdbdb1545e66b2fef6280170abc340151b4b889b4daf783021a7df7dc2cbc08882abda5647e9d14e70a74573ffd85ff38d6683a593b958d7a6c289ce53ce0c2f04c34c8a7ed3d172158e5ad1d014c737c612395ef (encrypted)
Stealth Address
e881641d8f50a2dab8ab2977959b34356519d927395fa1799f07b1f03dd0e65f
Commitment
363f74aa5bce3967c1fb6d8aac2f2500c4f6324ffad3f3a2f82d32707332da4d
Range Proof
672 bytes (Bulletproof)
Memo
29b14a1e61e7034f32c8de0bac3b6c9df05a9cf2fae3ba72fcd7a5e73385ec3083ad466659ef317fa55cd0961fcec99536214851b22314ef2dba42264e7116bf1454e61fb271dd3a3850bc0de5bd62f6d4951d7f9076b4d396dafa6e48506900a2d1c36623db5729153b70d224ec612aba069c31b12771dca69441d141fd9bd8 (encrypted)