# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
1e411b94216285657256cddb749cb3b19f2be67ab78f1324fdfe84647cce3e44
Pseudo Output
60fc579671627a654bc96401d152cd8756d54bd1116894035a4f7f62bc243f7c
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
2c0d9b0196991d201b204c9110eb5fb8a18f2382736b475955bcfb003946a30a
Commitment
22140418bbc72027b6566fd7c5a7ff21973ac42e3804c1ea7465efd291c8b04d
Range Proof
672 bytes (Bulletproof)
Memo
bd2e01a4830c5a063fa9679d5a854bfa3c21f448dd46aadef83f77b0e78e16c89b47375242dd45f7d3be7f7627dd4a9272c89c0004eec6dd480395e40fc89a2911af4854f2a42d2ee0a5c694b21b9d375feeb53ee333268d327f21da076644a595d79b50bbabf4295693d0b0ddcba0f0e385fc2225594cf744486db46dee2e30 (encrypted)
Stealth Address
be982b81082ac9362e59c606dc7f6c4e92756b7974ab53066f59e0cb28d2a521
Commitment
72fd57873d9318eddd8ab4fb9f04cb67ec7538749814807c2a173c1d0c13fc3e
Range Proof
672 bytes (Bulletproof)
Memo
08696b264158e6b5a0dd8f5c0ca24986293b9d83c0c01994ed6c780d907772718787c5d5e6c994415d704e80f443604fa8f2b3731804e83c5b6ded990441d2aa5fea817ca704047e576be386c273bb622b30284b1106487d2cd89c0787e0911ea275688984a585b6859a174b91bdf112756c3c46b11c6a7a0758dfd41b8c9adb (encrypted)
Stealth Address
e2a391ee54e44406a8c4c10b063a90d237da99d34343b8751426a19e7d98b033
Commitment
04c7d8f1a06f711b107d27a056a23e8c7767c7a8f20f5e7f1ac9a323aa959829
Range Proof
672 bytes (Bulletproof)
Memo
5a1eea62e262796c6d01bf45e08994649a80fdb44d9d59d6e55417e10427806fa97eba883688fb1e6e02261eae4787c29ccf1a78e55782e81ad00cb8545cc57cb36dc7845d8b2b0c814f79281e7bc9cb813dbd062fd53619ef547c87f40828568e0b48fc69b76dad01cc066ebb78782ed2d2993828119605e5afd1a4422d2b1e (encrypted)