# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
eedb8fb1539a93b342693054183d6a71f1295d1754fa0d852b92d37c6e8d7e13
Pseudo Output
b49d8c1cb7cb148cc44c6ba209ed8a92f2a4d846822bee976f92ef7ac3875b46
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
2e56f607d83e3f5610e2f58ca9ea5c4dfc1f61bc38cfba893f37cc7bf3160530
Commitment
14fecbb24ff0b5c1bc2042802a26cd4e66de014ae7b896b6a8ac5f78a4267271
Range Proof
672 bytes (Bulletproof)
Memo
e7a3f4f419fedba3713aebd7e235d70822406fa52f1c4286416e08cdaffd9981fcbafd034d3755a27361048cedae7c062118767ce840fa141785318c208f4b5298dfd2448d28740921c407be14b40662672e6c573f0e1e5e9e1b930d232bcdcf0f8299d050551fa34f0353675f6483c81c271766f2d7d7b8ba2d58cb12b42d7b (encrypted)
Stealth Address
6266e7895e03f8770b858ccd39802f12129d375d3b4114aa720650f6a99f4f59
Commitment
44ab6767014daa8dd602cc8ffe5eab32502e7080dde80210fe39f249d9f73f38
Range Proof
672 bytes (Bulletproof)
Memo
5c85ea4abea683d9dd0dad491b97893702549cf8c1be92cf8ef4f42cf4eaa464d6144882084608363ab97a4ba890c8acd40db9228c95bb48cea95f81ae7215f63c6b2a36bc50977549a34af0ac097aad8e8ed91387b708c223961b7444989593d26dd8bc9925f3499f85ba73bcdba4a100ba34253a4c9be215ebbae50ad40dc4 (encrypted)
Stealth Address
46ae1879821491b1e6c2a4e2749bd816eb48de3b7e27c7a075c7a8a7031f2a29
Commitment
d2be43d2c7194e7599ac337c77fed8fedfafe0704902e4f9edecff7825f7c916
Range Proof
672 bytes (Bulletproof)
Memo
529ae3e6a9fc859824d1b47faf8ba97bbacef44dbf22c25c63e48f7bc681b774898def467dd7489b4f82971b8782f6966dfc528c41d9ce58ebe96a8acaf3eea532532580eedf78f5f8d504ea35aec274669c2d174a9c4a9f43eae78eec215823f5c3d247bd24a65845da1cf208655d36f33c5bf4bd0f255dc8c494199667594e (encrypted)