# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
ec550438ef18edc4aa3d6be9993f8f75ced5a20c009d15887db2ae64e5fde513
Pseudo Output
9ad606dc6bd7079e8b6300384bdadd2429c372fc7f68049f9c6a38650c619c1b
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
3e2e1027cb262e4fd00a4bcc502125cc2187adf4e55352c7d9fbcaa2a87e022b
Commitment
34181b82b3f4c6da6520804761006962c8ee58aec35851c2b4c5079b3d2a9c58
Range Proof
672 bytes (Bulletproof)
Memo
8301a2f0b38c220e6042d9bdb713e36128a52ef97ccf505ce093681a431873371c62d39b26b52dba5c646e9148514aaa5b12019d65e22e2896868e4a14223a5b7a90aa9dadfa4f5d01610fcf2e2432c59de9a1122d9ea28fe70db1ad1897dce11dd402aad68f0d680cd6dfaf48378ab16bdb09aca71eabd35abac23d26c5902c (encrypted)
Stealth Address
6ae792948c3b6d76efee18907c3b6470d139c1104e7bc8d67e09b3b213b4f363
Commitment
6005523776f7be3a50cbb83e79bdc4059d95e91def8b7d6c197579f279acc853
Range Proof
672 bytes (Bulletproof)
Memo
8a2fc744e92f100538f6365921b19f614dd913607df635cd0250570a0fa19d9fdb3d8b4e471c2907c5a4adb8d8307abbd5f9fe52c0e8c83dfc9a6a205fa58fd5548121699624aa4eacf8c7d6dc3601da09830db4b7726370e10829a27f086f3c659ef5751d686554a7d5657480fbbdae84a3988e4fd528d52971d627f7ad7e70 (encrypted)
Stealth Address
a6ef07c419d2e9c97e982e0d5de98fdccae274f6563b67ade9ad1fc93dfc5e28
Commitment
00029d96006db1454a234e0f3889831a9947e1f105ea2514be1ec8fb7b6b9e33
Range Proof
672 bytes (Bulletproof)
Memo
0b37faf1e0088600f4cff33346e8c84c0e45b20745d56a3b46adc3c02dfa4eaa301f4bb5e75ff6d907dcd38221285a10bb52466d49a609046b1bcadc8fc67a099104d5f0ea81e95f451b2a72331ed089796da3f31d22e4b4d97cfbf689eb1fb062bc5320632206b780313907f425ab27b943da84b34fc5b225a47b5f2442bb41 (encrypted)