# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
e265ee98229e531089981465ccc7ba9a8f0cdcac95f01ad4d59b8cbe1ddf256c
Pseudo Output
388b3ec3defdf47e199143a00ef1c7df51ea91181aa5d2d038ca3270602b8d45
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
a49993816c22ebf5aef139e91c8d212a0f90e23306975ae815a97400360eae3d
Commitment
e239a44f62a03d59c9583ee896affe2d0f6890c2159f205bca3735e11d65fb77
Range Proof
672 bytes (Bulletproof)
Memo
b9c1f6f37d0292cada73e20fd055a8af157c6c44fd9487792ff7d9d069b1964a32f8d7afd6006eed6861238ba3d991aefe541e7b59028edde53967bada5510bb71148ebd936194b18acf4f390ba10668e0f782b6e96c15d834237226a207292cb917940c96e501fd0db7aa71974c5d92967881215697e1e0cbfbd04b0f3435f3 (encrypted)
Stealth Address
262754541d72571ad124462f13d3f492494452afcf79361861ba5d524ec2f43f
Commitment
185dec0546888d88ba81768713538759462c911124a6ef058c72b4bfc9b8c070
Range Proof
672 bytes (Bulletproof)
Memo
0f0344ac3bf09acc745266b4119452eac6d2f0f6db9de1135015c9f569977508ba38481c759b538147e5af0012917c78fc6a08fa17d8c31cc68d162bd2cb7bd22303a086246b796477b21da2585cc095daa591d2334be6bfcfaa40c0f54579017b6847dd6d3b7cdc632b6fda8e975b1ec945693bb6ce9466df87f34bfdc9d67b (encrypted)
Stealth Address
40252bc2fc7d852dcf31dc1c377c5a14a1be543788daba8f8138fb7114371c62
Commitment
88578e3cd563136b5db712e01bcbe344c0432e150a6550c34fd897250e962e64
Range Proof
672 bytes (Bulletproof)
Memo
825d078a74fec09661fe8f7628a020ac96542ee241c9f3cbd4a70002239e1bf7a99b72441fdb9e9d63a197ba971eb9e17beebcab153cc941c279539fbf725965ef0438148c63dc54d00b6dc50cb6e0c10722aa2cd8d64e5ab43ea455fdd9d4fec135522d6dd04a37fb41e4a9ea1428b5913c4eb54555fec1a188d4dd58edc2db (encrypted)