# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
a2ea3910b4c8e7a9b186ecbca86df3d8916a8b7176df05688ba1cb0b5cd68e1d
Pseudo Output
d80c5b83da73a1ec981708b3bc9e2e0606eb939aa3cf77402b233b965f03f60d
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
662db6be9c9ac0fe96a4278acb885a565c5d3266683f05c0e41da161a49c020d
Commitment
2821e41dabc9f0612099d013d83cbf5b6f76e69337bbfbe1d3ddb40736c90526
Range Proof
672 bytes (Bulletproof)
Memo
82f6eb770f60427ed84b61b909eb677c90725c51ab069e71609c02b92cec37251408d5d35e0b0c0f8fb41e80a53a415ab3bdf4fed1c055d7eccd075908969160a8b26667817fe7751c084984709303f02f328fac03e59896d3e95eec2e91fa3cd3cdb0eae0ceef3c6375ce38cee84bb74cf8d2729d17b815eb316ddfd183fd68 (encrypted)
Stealth Address
8efe9d7401d4c0a9580407dce93f0cc6bd952ab40d9c5b25fe49a8ebd974432d
Commitment
32e0b6b419639d00c177a125321840608d3861799f9c8a599990a7310627b017
Range Proof
672 bytes (Bulletproof)
Memo
c3952cb541bd75aa8208d1a87cd84dcac387b7bf0268a8b79df3531a06ed7f517f679391bd640814b7e52541a5770f30bf3787bfbecbd32cde10dd97087c983860c2bd721f2b301be99a44113ef1d241ecac10f6eb098fa838f22f0d345505fe6113df2969d81aa07ea320f0dddec0068a75f4322fd2836b874229511980a06e (encrypted)
Stealth Address
3c2a969ff55d9debcd3846eb6f58975d7e131d8154cfe3d30af6f8586771a17d
Commitment
56e1f7136484f5cafb59a242139b5dd6b823d99b6338d92261d1f17bd256eb0d
Range Proof
672 bytes (Bulletproof)
Memo
6ffca8e1a49b93afa6916c3c4498cd34def062c0e7e06bdab47f99cab4fc52c4567bba383538f8baa2c32c04b2647b30e57e15b85cd15f02c41129bf3d4639418e385fa6742359577f5d1eae35ac24d19b84a8e16bac90c33d15b985d7ee1c95b1682a50ccfc7a7b00439d4ba1de67fd75ac2dfb4ce4154ce7b637b1e88bdea7 (encrypted)