# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
241e944698b80de42e3212261116adceb08c2ee43e89bcca52e73b569a69e914
Pseudo Output
80f08bc77312097f91b62b617643a04ada033a6e8589078d4bf9a9540a44903d
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
12210f3bf32fd7b3d8018157865f0ec29b54c678eb0c17f3ff57394c0acc4473
Commitment
72de4288206ca5310beb20ea9833a99acfee668748a613b56dc551f14f3d5424
Range Proof
672 bytes (Bulletproof)
Memo
4e2a0abe092ab36a78d016447e1ef5c1795eb9f2a1c3db647d4cac4f79710c288f8b46ce4c2accbe1da288236f9925db9c68db7dfa77fe8d2bb6031a6f5722ee71cbe7b9de05d4f2ea6d166cf4c7b04bdb7d84014057e99b6db0841c3d5a6b91d73c27e2f7ae653855c1906b34c77076c2355abfe918e8b0c645b66ca051815a (encrypted)
Stealth Address
586df18fc9cba190601f0939b9df4b6c5dff81ac4e45b31d47f2d07679717615
Commitment
3691e868cc88695f10c8c8e7a284aa98bb92bb4855f2584aada4b39b0d650d18
Range Proof
672 bytes (Bulletproof)
Memo
1de6b8a82324d8b3ab64001644780225151beb96e06a3394a2b28d3903994a37727d351732262ad8e970979426f67601b912958845b551f046b1fe585ec47522fa1d1f5d9dd425e098692bd238e5f81e4c686fd5b6536b767382e452dfd5721f952026dc21df0477602b034cb802cb951a532d28b38cfe6de9dbdc0edf65dd77 (encrypted)
Stealth Address
8ec8a5f34c05a68f862eae4b74169c75c6d59df7d7df98177cc52201bb7ed570
Commitment
34d8fdbc9262fa762a1ad07326e133f9811ef66f6e2fc9c4de16ef34a6e9ca31
Range Proof
672 bytes (Bulletproof)
Memo
d7462eab94ef8b909255d5f2a68944fa3a2cc685c5f7fbda611b90c96b5b676b74101e57e2cdb335f6a6da83cdca6a3b6f86ba9e937914e12424750a27fc59d58bf34b97e41263c3426ac84057d7dcccf5085689c4ff375f5524def84ef07438b2a843b5257e02e4d2faef07da8e6801843950a44e09abb6ee95c895b2925ed2 (encrypted)