# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
2af797543a9e12d14520af23356b4268e88128423c888c7a92c17ef163c5f41c
Pseudo Output
f2e0f8f4d081d0b66a40294e994656c8142af72e0ea2f58ccd2b490d406e074c
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
c818cc607d285649195b0b976e4c8f1710ec4a0865aeff290a4678324225b255
Commitment
7854b536350e616e8b94f38224da06d93a7e3090edc78aba3e95f57da9cbb855
Range Proof
672 bytes (Bulletproof)
Memo
ff78e52aa114057ed49f11528bb8271a6073a8160dd9d80db4c1e956f3656c84ac04babc058ddbf1d69eaadf326fb6a5ed04ca22d97c035c5dd23fa67fe390655fe6aad4bfd11e7f457f9f7ca25dc9639004f511f15099b5252162d6d133dc788d44b19e143038af4d56aa21643e971f7a4cfc28f63cc8d0a2cdb891e9600016 (encrypted)
Stealth Address
301a58f0746c866ea9be99c1e4a3dc7735a0b712ac0b21c3f7cc91935db69a5f
Commitment
4ca290ad72a4928e5c068bad72e29350ce7046d654127596cce18eeb0f98ec1e
Range Proof
672 bytes (Bulletproof)
Memo
b5cf5ad57078792f1e5078ebf4c13d661d6d2bd56ec192f043f4dd580b2f577d291a57512f985bce8e2cb46042285c3f4290db52cd1af0fbc4f9042f73a021ceebf7b8a5aa13c8f961345becdaa09351318e8b3b6dc2877d2acda5f54d176042978aefd58959ef853a2f19f776c678e40c97956bb767a12f913013b273af608d (encrypted)
Stealth Address
7ecb0bd4cbebe12a7638f02ae8241d57af149e27ff16871b88b942965feb8815
Commitment
86c42153cfd5e40b239ee842f7e5519594282e3ca3ebfa1f65378db81dba9a1c
Range Proof
672 bytes (Bulletproof)
Memo
dbcae65c2a149a45998a5ae25825f9edf94264f6a422defbe8f6ff3af06d4b43f363d3a7f4d741c9ed69904581658d487636b9c90687e6af0d196b1c085cab49604e66a038c100828acab9637b820214b15c88399c2a60b788c23a78c6f9d1d7df87362f21ef67701e35aafcdb5fe5177336a905ccf1842995f7ecda87b866eb (encrypted)