# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
2a3610f3d046cedb6f8ce3bab34b3dd436c7787dfc1ddf87ccc086fc52e3f834
Pseudo Output
7681a22cd7c308dabe4e679f99124639f3dadd2877a5ec6ffadc21436fa79b64
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
cab5edeb34f3e3571f4fee8e02228c2f0bbdee56819f0078f2ad3fbcb4c09b32
Commitment
2241054dfae77b91743bf1796284a1660e200513d70f74aeea25244f843e8e25
Range Proof
672 bytes (Bulletproof)
Memo
742e6314fddc366e563bcc5134aa2500ce7746c4b450919c15551c48b76b10ac5b95c2874b6cbe66bdff4cb0cd0767b93902d0c415eeed2aaa3a42a8268ee67235db82f74694372deafe1c9700d4759f2c724aefd8d4de10472d2076095f152c3ab6c8d11e072d5fbeb18972996c0bed87e097d9e648499ee2049e2adb5ba1a8 (encrypted)
Stealth Address
d09e4e9944de799dcc52b2cae8f08fa789c3624faae5caa37140c73b8060f425
Commitment
626b0c5acbcddd11146f69bf1c1b91d73d6c3985d0b2338c8941ae7a1b28df1d
Range Proof
672 bytes (Bulletproof)
Memo
d10fac2c1138c87be4af87a874ddd852a2b965940e6849630402bee272e07d93293f5929f01cfc765057eb47d0c45b77321afb5aac5c76af4ba575780283a8697b426c33ba03caf545f2460184e1136b4a92d4fcb0d06e2929fe08c13621dfd48556e2259718f6832f1d6b949a4cb035eb3275fc8a87fcdf70b029b469aeb1bd (encrypted)