# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
4a9b523eda88cd5340bb73b1d79f2246dfe8ba1c6076b077a5e0c10d20511805
Pseudo Output
647431c8a0c93575fa2c1afbedfb66682e4abb9b543313bd6482faa39647bb53
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
f2e6a67b495c86ab0da66d0419c561722d0f5edaecac0e6a3eebbae3d1f79f27
Commitment
c83aa168c900eba8b25d81efe13ffee4f6a4f8e987bfb46d9ef189006f87736e
Range Proof
672 bytes (Bulletproof)
Memo
847914ecf60751b8ff84ad86e04ce70eac58c0e81f06951ead4e8480d0d05fe29732a0c37974a2ab0d94ad8696a46746b7f222b953e9dbc04aca7a88dff7bdc9091786fb886907403595315bc413edd4a74ff0212f85a2276b33c0df318120ee93c5559c8c690838559399f05b7389eaa2bd090d4c1231fb3ae5e6b15ebf8aec (encrypted)
Stealth Address
66bb427836eb14a0f44c9dc05bfc9231c3c0da379d74dce23363e9401fda6862
Commitment
08a8c41a18413d93e7ac3ee0733f7b38778ffc945c1353ace3dfec1e97c71a32
Range Proof
672 bytes (Bulletproof)
Memo
a9407922571eede7159624fdf903fae3b296d3f11caebe0ea3e05ba651ad6dc2e5dc14e3477a993c762427ebccbc7bc8a77c7a717c27d0df56571e55fb5c9ced4af9ce6214c278caa691eb5f707270c5d00ebd4a23ad296712b41028914e2b578281f489df242d261509ca9959b6284c05882aa9409c33756609ba7dd756c457 (encrypted)
Stealth Address
243d86ab9074d3015bd78ff743c043d75975374d2b0be9a8319d4efa6486f648
Commitment
146632d2cd0a8b49546a3124fe53e933f7663cebae1ef593df7439d50506083b
Range Proof
672 bytes (Bulletproof)
Memo
88a0466e82a1a2140917c5ce77edcfbb3881d39437723e82e4abea4cf7b9e32c3a136005a942fc66225d6df0392c4b7905290e031472e62e6dc5691f42764add8bd781b411d61c8e702e70a668ce273183a1ab2567d0da7756a255848de9c48cec96b954f92846cf4726ea738e6cf7086bc4a2f913ea5951f4cf8937d75afa84 (encrypted)