# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
b214966e6d043267277dbde1affdce5027674191794b65e550ca4baea15ddf14
Pseudo Output
e48c0cd3873be4593dbc28a0717949a4c992101f748ac5785f299caf1054f01a
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
2a885853aa2ed00e5d25dc50cf291eecb267dc3cc39ccab9e206d81782f6146d
Commitment
d49dbaed839300c8e727828be203c63e6277d534fe4f013bf5aab9fc9431ec33
Range Proof
672 bytes (Bulletproof)
Memo
7b90167f464a1b2108b1a130ada08d830761a8922720ca831a3fbd2ebcfc6e2bdbe527f83276947e2e337e8c420e64f9a972afd85651b1dbbd45e412869aff10d06ba000d439baf897493bee74eecf0fdc9aa46e3e030d9acb2a9281e746dd8a9397d7d96a4afa5675131d64fc9b2e38cb3e2ec995448a8ea9d01aa227e4ec3e (encrypted)
Stealth Address
065397f5ddac43e48c98952eed54f730657f1d9fa736936f4ac3a3dc2b97d36e
Commitment
bc8ddf422fb2dd2f5919ab9a85183d17d77ed4838339c007e385f3274764eb29
Range Proof
672 bytes (Bulletproof)
Memo
320d4a2b876a41c130622be9cfa11bc9781b77d92a93f77681665fc69f2cd365df592197c4fa6ef361ad1c653dca7069c5ee5a6f9a59eb7962c2c46ac2b289f18f50a1440f9d55bd66dfb20c76c9bb35c45df62fe95e6a927d1928d3fcb04883a0eaf21b380329645dadb81e78ae83d5f61d15df766167e057a4c6444bed0c2e (encrypted)
Stealth Address
f64c562739a4927adbe79c530a4586987ed69cb6b54ee45c8f5a53284d0cd645
Commitment
ded55318ccfe9fe11791fbc7413e4e4d95f27cc1fe6815c75d3289dcd95e9d1e
Range Proof
672 bytes (Bulletproof)
Memo
051b58548237c6a7d6138c6d16132a99a26a4d00092c09894552673d0321fcfecde4e2d5b2ffe7c5fafa8b02b8acc59dd334d3f82ba9391c3cebe0fc1ec9e5a8aff99adc7a68883d284173583dd2056352056c4e1df443e17c8d10e5767518f0b5cef6b5bae4f8d2be2889335a7ebd06e4ba28d0ca6bf449c85ed9890d69ad40 (encrypted)