# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
9a71f0c1df3c21bbc499a5e38618bc465c74dd9f615874c4856ca8f14346234e
Pseudo Output
d854ba92825d1ada2673c9d0cd1d8fb60561f819f49bea25ac511d17bb1cea68
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
e4ad215cb89707e5d1341ddafcf365f85d82c0cc46039a2bfcc10cace74b8615
Commitment
1eed31b450edadec496429459f3e43d40104848f25359b8e88df742c3e6ce839
Range Proof
672 bytes (Bulletproof)
Memo
bf4750104e3663fb43885e035c611539453259b463650e266010fc6022db1f8b3dd07e1a6d3899a00d274a326f3c05439f8d48f53349bf0443deac548ba98185cb74056e433c0179eab603a948bb4cfe3b6132fe0adf81b4ed67bf1d58a2d1eacc3edd90f87a931480f2e7e02054006998531e1a77b271d863c0a939a258e950 (encrypted)
Stealth Address
164a6df1bcb19138975f8d84cb2248946d917c724f2dab60f5548cb9ffa69a53
Commitment
14e3c8bfb470ea2eb541a7b72df43833e5c1336872ed0fa0916a9431a136a431
Range Proof
672 bytes (Bulletproof)
Memo
814b68ce1c6e708885f0c3160762cdea18888671812c2afe5edf40bb774c049b44cdb37237fe33fa30b0279778d7a34dba13d33de5a9127d34f9c392c4074300bb656f93d8b363c1b7c07cbf36be2fdc8c87dcc72041930d548afa0f0d0f3a8708d116a2820e24a4b2dd6fc23d96b4b85b058a7733b8d262d3689ccb5aaa3f26 (encrypted)
Stealth Address
4a4285b969a6d017bc24d33fe80736303574d15c289bd7911f5dcba3ec2d074c
Commitment
c2d9c91901d389f58839642111a2c58593f5b4ac884831ca978c726fd0139960
Range Proof
672 bytes (Bulletproof)
Memo
cf4330cf74e1b50b8a11a6fdc6e8c431c556958d54f3f4e5db32668a663c39c80e4c1f19fe90845375aadddfe463faeee13b3d7e542b74f6d3808745cd1d4fef4b745479209c0e23a092361927cb9e847ef221d8e8ff798ef45b4a0a5a04ecb0e1f68573f86bb3e7ad29dd3a35df01b31325258a4373a03aa34d6cd232b0a5e1 (encrypted)