# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
025fd256d5e1f4b376a186e42f14e8451448a5734c05958a8f1ab8798e179544
Pseudo Output
b8aaa41876c280d9822a71e8b9f3aeae52f7036d68e7a4b08e0e6ca7ee5fb70c
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
2ec6335e4be07e2a447f7ac4b4886a935a797e6865722056fbdcec03f1ec0839
Commitment
94ad1305fb15532de76b6d7e3cf05fb5ab8267fe538cdd17c31f5a4dd0158765
Range Proof
672 bytes (Bulletproof)
Memo
3efa3cf9423f8fd1a81cc22ae0f8fbad812cda96d8f2b68a570690af32e80b079843bd7439f358a3b9b201436ac5258386d51abdf8a2f2b28c16fde34e8718c5343e4d0ad172b56309a3403107a081e8a95600c7f5ab06a32aceaa81ff9e715d03943b29174be870281b1ada1e0853539c40213b2c269bc5556404624436642f (encrypted)
Stealth Address
ba7a51fb5a7dd05431c819cc6899f1c93b2264cd0ea93beaf2b7e639cded3376
Commitment
8eab1a367121714c8f3cc543d553a131bbe002ec2b6db9ce4457bfc12d22a25c
Range Proof
672 bytes (Bulletproof)
Memo
dcd1b52cb6a0102f87d579ef94a8a34c421e1e62f34aef6b7cd3dd7eaa1b359fc950bba7fc19f33700d00eba309610497644578b9e3ad5ce48e6f4129063ab993d6672e0f9fb6b2cce663271d617499f57ce44a4701cb46f037bb30cad5bed67972a23693af1df2ae06cd02aa9e9c4e5f14b96dac5661162e4a83f1ec363aec8 (encrypted)
Stealth Address
2aad980d11d79d4c75c3868a65cc2e5123fdcca15ca393a1f4cae7c417406434
Commitment
d236580536fddd48d22db3d3d2e53b41600ffa13ff91fd9d3dbabdef7ea48062
Range Proof
672 bytes (Bulletproof)
Memo
766b5597ae2959341f7801762a01887832e7d2caede631cf69bf994b908345a695dbd079bbc15c8379aaef215f91b52eb3d9a44d656468c2686a3365c6d40b9c906011510d03577fac9ae67251b108028720b326dffadd812d68b875a283c40a5c47649505acd52dee8eabd7ec41045d7c4165f175b3ef2aaa656e54d03ca0a5 (encrypted)