# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
c2b18a9f3b3faa8570f887593b7bb7e13ee02dce928566e777d3307ab9e2b435
Pseudo Output
b0006c4ef41dfc1dac3c0fd47c8fad80d8df42dac1c01c39fcbda20b31f03f54
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
c2d281a77a0c8d41bc4178c10b3694e4d47be1faf83430bd10354b017b60a373
Commitment
5468abcffe311db0538184ea4836f1c4a8b4c7d2f051744827d46fea639f1052
Range Proof
672 bytes (Bulletproof)
Memo
079a6a62328cab75726869a1f2c272a55300971377d535c0ef1c51d6ef49b1f07f0d0dd19aa2231f87496e32a5fdf7bfbcd9460bbdd82ec71fb9d388c483f138697727a6d6e4463349c654c26ec7c99538107111f6c5d56e2702eed83df7033ed51003b736ee86ed7eb7309d17f028cdde96887f1216bca71af7ad56821ae2e7 (encrypted)
Stealth Address
fafd2a591b6497dd4066077da7372f07a8cc36c826b1658c6861e1195e0d6719
Commitment
827a58da28be53a520ee258e74a7e0872f2b16cec9daf06e9b2fe4ebf4b26111
Range Proof
672 bytes (Bulletproof)
Memo
bccc6da8cafb7f6b5fe737ed895907fca5ba9f7f95a7c1a37c98323b67bef3ce9a0adfc2a9686742fad2d7099eaacc5dfc50fa76a1a3ed6bf16ffe544fd079bb188f36d7ac3bf92e9c9fae815b00b8175ca2dd03e010d0edd25d5201480f1c86e6ea70c11d910c941682f896fc5cd8e1cdbc8da9c90128f0e31131750748df30 (encrypted)
Stealth Address
74257d79fbd5cb5dadcc38f70ae473738b05f57c36c26dd9edff9668548bdb67
Commitment
3eaefa6f28c817d17540144a2d4b303fee2df86c4faa1e0fb212c6e72ed5e366
Range Proof
672 bytes (Bulletproof)
Memo
6f61a7fab5f2520f56d023f36362c79e70d488ac511051c89d2dc5294fc0ae6adf252e21871ce08831bfd32a249446f4a950271322fa07b67a01daf5ce20d261041d54d2df227f2c2adf438adb192b04145666a7e61104d366b0883fd9bf6e790fd895b6f24686af47f0822bbd540cdd3dc58ab5e88a8718bc024f746f9b6cda (encrypted)