# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
e260f33899aec358b666c9d0e706c00d693f2799d353d792b8f58b10284e002c
Pseudo Output
08cc1d787305ad3f369493f8292e0382badae52220703950ee8623b21b8eaf77
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
2209ea181836612c0c3543c002e7bfb326890d211ab8088854374d95281a7028
Commitment
1c9eef6beb66f712e4c674247f0dfae241a92b3b1b7c1b8fe366083a6ec2b534
Range Proof
672 bytes (Bulletproof)
Memo
420abdb4755011d9c77773af69a4791d2bd0553370101451d12674951bf2c15a33e60f97a02a1da5279d9998bad61a2f5b51a754920da64a4b71de9be9bdf7281e855954e2f820a94ee8f9c11f8a8df0f25224683b5274b4c00fd54def4558218ee36a3ae40ee95479da9c3c0acd272e971520ca8ad1be2eaa06bf29d2b50dff (encrypted)
Stealth Address
3e1e6c212826fa2f84e1708cd90c2209ae0707a264e0ac24817dfaf514d5c563
Commitment
a8c5bcccc98dd67e33effc4b3fb40ada48313b6aa5a878d079c027daf1863f0c
Range Proof
672 bytes (Bulletproof)
Memo
8cf116c9cd6b5216331ad7f4a424d86bf6d6cc13e340e6ed61887aeb9b28a5e29393dafee183eeeb4585c767552acb566685577b1dd2d1520a0dfcf523847c60680d6d76ae594f18a13ffaf988025eca7eef2cb95c6617490d7cabdf09d73bbc2e1a3a4a98c4f981b1c02f69f437a9a3aed896b4713669dbcc8b60f412271ecc (encrypted)
Stealth Address
b0f157099aea4ddcb27b1ff8a66cf90af54dcae8285095db3bbbb7539a25815b
Commitment
f2b9d23dbb3dcb01438c5dd09ab4721aaaf980a5768deb78de7aae8c228d6d47
Range Proof
672 bytes (Bulletproof)
Memo
1ed067fd464a034798997bea678e01e4d0ebb7fbddd9ad307554a29377e4c92b0c419c107c20334da152b103eb1c289395a660bcc76933494c83285a94fdee65adf157cff5e12062bfe606f1d61d56800c34b89a17044a0196566164a0e9299e2843f659d21cd5be82387bec586001aa0a7e7ba4684af54658d5ee5348ceae39 (encrypted)