# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
2c61895912456fd93dc72b0d81a2e10f95a87e3b2342b506007644d01c49682f
Pseudo Output
4ed86958377674690289dfbe742b290feec2c551ca55eb22929638c7fe5dcc53
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
5e2d6a1e18e75b6fac9274811d00ec0b8a2edc3ec58334aa73f926cbd887db03
Commitment
9c74ddd8f0d4deb98dd23cbe3f2540944ad552521cba85ac4cd4ddf1e0aed63e
Range Proof
672 bytes (Bulletproof)
Memo
427c73e5b9ca9dd9a8fba84ed08c4c6dcb0b590f066adcb700ac28f7fb65fba94eab3c4197ca7049a12ec02f725d5da2df18ac2906c8d4f98210ab5bd3c8568cbfdee3b11e66e6932cc457589f231eed9b1cc18644ab6ce5d8e3d62b5f5d8b0550c317da0226bc2a52268c5d62b741b5bf43535e28965bdae097cb44779e1039 (encrypted)
Stealth Address
3468502fe61e1597cb46bd49c7606b3e6023dc28e382eece5f881883a3b4e44e
Commitment
b40eff3e172681fe4a077c1565191ee81d9a6c45ff92b7c6543a799e70298149
Range Proof
672 bytes (Bulletproof)
Memo
adb2fa34cf1717ce61d6bdcd1ac3fce3d435749f448aa203f5742084a8609f4499cc4ccb5cbe9f1a6f4657e0952c7dd67d0e2496754c3ddbbbf7fb62a4cb2fde37a7fb568214185ce22ced1a3d83a7ebd1963e17a94155ad39d85bd12717a88d8dfe70a24c500549d89035cd205648603be646efb871d6651715dd52692f1f04 (encrypted)
Stealth Address
a05f6db4d2103687ece512c687f4ce33061358fe19fe5f79b7c0201c38a75629
Commitment
4040e64ec79c4c81522e35d8b2030d1659440b4165aa7df28084ba55ead1e615
Range Proof
672 bytes (Bulletproof)
Memo
ce6e585f5074a34f49697db046dfe4eb4e81ac6d720490c41fae2ad5f4f331f2e6c01feadd254bf7a28da2416fe69e756ec5d85bada57cbf8415e9aabdb918eba003a0826694d65fc7080d062d8d7fdb8b54e6b63b69897f1f9bdc09a8c079c7b2fb2e872c55e5065104847294543e415b9925d3e11c2eca4caf3b9f57b60ef3 (encrypted)