# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
2ce2863b4f41d248b2f0eac2342e479d3b528aa0c9452196debc82df74c22955
Pseudo Output
7e479770e30f596e7c42332be7ba58e1b2cf4a3d8133690bc4f6ede2fccb0e65
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
e2d1f5bc8e02b84a573a950166268c74be434e0d347a45b615f13acf1c11946f
Commitment
c27227a4fbcf3f64a6b51a4095cbdc6b8e4c350776120bee013a5da4735fae65
Range Proof
672 bytes (Bulletproof)
Memo
f7dd29d0e4bf2c5c070954f4c908929f7bd3e8ef9b341fc0ab62a9cc53b88b3058daccf71f261f0ceb99076844036cbcdd7cd3118059459d6bd8db690669b0eb14d17983853045e5f35bbb468741996aa661008704399f97d792ef5e5299d98452d3834fcc240b2301c4c8bd6611238a3ea1e58d945a386c8f4013039922a154 (encrypted)
Stealth Address
10a91d991ded1ed02191f1651470d40b088b3bb2554289740c9a8a0d22028859
Commitment
0ed5b367a71feccc3c11c90353cca0b5f1500ab0d0abad7e774c29b04a7afa31
Range Proof
672 bytes (Bulletproof)
Memo
15c6182535a393b303325ba61d2c2ce0e1f85e4dadce61da518f8e89064bd88677a522947b8c76ffefd78893bab12374aa0bcabbe3cc8dc5aa226aebf95e8e0d985450759a32f2538da8481e01bfbd72c601a8488c7a0670fc012bd2545d9934eba40dcf6c7518cbeafcef9021da448aa218184653742cf9545aef4885c3eda0 (encrypted)
Stealth Address
b41e5dc0aef67b5a704c57f7614c36529c29936accc8601ee351882e7f2f990b
Commitment
e6cfb8d30470064d29ec83d5b1276e3f3698b5da22be2c6b3827485ef72f941b
Range Proof
672 bytes (Bulletproof)
Memo
ef8e939324cc0cc064e5a453069c5e1f710b233b9e02ff31d67acc1c92e626dc35389b5464ad20ede94e1d5a37a10bfd1b6c9f11bf7e49ac6e6f4599b78870b48d115c312c8bbd224342ae7e0a46b8d295fba2660489aaa293702443510e57ed345590117a403ee6753eefad8b877cdeaee1e8c4f1553b2b43e164465fd089c1 (encrypted)