# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
ea70d4c7713cdb5429b4fe87813952a43fd9e29883d0ff3bc1b382df1bc65257
Pseudo Output
4261dbd1bc692cf1458034dd92c039950df672353277135bd8a4f148aadedf46
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
2687a8a80ba583e4f43ed672f875eee48859225b44667442570e614ccf853b4e
Commitment
2eda538abd98dce91a4b28faaeca9ba43968351867458179af2ae830d6e96032
Range Proof
672 bytes (Bulletproof)
Memo
29449a663a89db15ce24170cc8399e29eb6a4d4bedf954d8bc7874d00e0a21e0e7de0e1346fd4ec676620e7708d3d817688d2c87a5725d771bdf992b27810969a3822a0a5a8cafc221ae85b6450c3ff4923d2eda246f9aa4534537f6c79b1b14727d92afe688375593035618f6ba3e2d1bcb5b0517ea14eaa8e51327f7541711 (encrypted)
Stealth Address
ba5a3e69d3c1b6ef5498da3c97d99363f5ff7ddd68d618584e82f56b43a9da3b
Commitment
6e08153803b5f8863d8950c42475891699912d1170b9177ae3424ed6a882d413
Range Proof
672 bytes (Bulletproof)
Memo
7e318fb1b2d76eba4522a25953d3645f26522887fb9e3e9b2721e8b7ab09ea2930ed81f1b923f2d8db8e7b8e17d2a8afd3b53cc5a6717c291d730c12f325eefa1ffd7536b2ba81e29f70c45029f6cdb00ce76e88706a1f807a56688b720a940e354e9ece2b41b0f640740d2bd964a4b00902b7674fe4f471cb5c6b3658ae45ac (encrypted)
Stealth Address
20bea43f1261f0e507d12499b3ea5bb3edda534ecdbf69acab4489f902a39e00
Commitment
babc25e71a27a79b11f977f097a84f374d93dc17982e9692065c62643bd5be7a
Range Proof
672 bytes (Bulletproof)
Memo
731cb8fb84ed154496b2f38b1b2fdc1eea1f370da5ccf244d44854135c82fc29704226a219ba4a97b3cbdb302effdcb516cb2111d01e3d29379a782629934de64725cbb812618873b28c80b120ceb00f8d2ed63467ef506de57fe18e31e0e6c41593937cd683374ba6f0c265f50b2252507d2731e74d977e5835e0808a21fcc5 (encrypted)