# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
c8d21b32aae4a24708163b13d615454bae1653eb868f59a6a32d90a9fa011c18
Pseudo Output
368d21eda728ac3df10a64e8a888d04d3d96c847d5d208dc76431a5acca41965
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
1a8068c39d141cff6e54ca6b2bac630feddb683be66cc0322664e5ee4d7b5873
Commitment
9a8177dfc7bcf2eb3dc02e147bdda42c6adb721a2e6984ccd9167babc10a9907
Range Proof
672 bytes (Bulletproof)
Memo
be5fe3c8c637ceeef3dbfae4d65915e80603cb74ee6d37678583199b2c0cc4df206a914afe667752b7f132722a83fa1eb1e68b0036c8ddd30b84f898be34b81244d59c02a1c8b40657fa59363d4263b1d4785eedebe6f097127827183e8e3cbf8e62c32e39e8f0a5d7568f89c89b60c429dd70baf6603e8e59c88e2640cabb22 (encrypted)
Stealth Address
468e2c713380019da274e4332dead4e9b1c44ba49053e4b172f69dc08c515e46
Commitment
7cef6a4f93f695c9e0bb53c6f7a250b64c9f11a08dac38918631ae0f39f74058
Range Proof
672 bytes (Bulletproof)
Memo
d7fd8941aec65672ffa6d81efcd53587b242aa66879d532082542e047119680b427fa6f958696ec306c3852391a722066594c7642454f5d3f48bdda616d95b80fb832de41bd8cf3dbd75c7652c966acd522284d9b41c6d0a365f843c535f1c2488dd9237bb3697ecbe08af29f15ecc3b14ada900896628e0af744c522252718e (encrypted)
Stealth Address
50df051ba6b8a815d680096a3c66197efe4457c8ac97d867370156c70245a825
Commitment
1cd1c4e8f75c873837f75560cc0e4a5e158cf05c46ca6e3e061390e4ef79b242
Range Proof
672 bytes (Bulletproof)
Memo
39712d9027bfa24f2cca92f0a0ca6c2ba320ec3634f4f658265def942557428ba733090c1431c3a6008d5277ba4fb2eb74e6d1001c5d6823e88119b018e5815e9ce696a4d81f01774bdaba5045ab8dbc6cd10a01e0ab7766bad7e97a88b0c9c10e0b4d0fd867265d5bec6d858528795bc003d33f3c23c35e60d71565f22f4732 (encrypted)