# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
285e7e243d2a566753b7e332948432f2724182992a4e43139609dc09ca709b0a
Pseudo Output
36ccdaec371c8e748d3cc321e1f6df9f760606ae0659de3e2619c8d19838996c
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
14b9ec88be4c0ab3be92f6574f4bb046d016a062e69d34cab1bf2cfb2fdf4a70
Commitment
f2706c599204367ceed6b0fb29dccddf8e65c9216921d4d3f31ee11c51fe9b0c
Range Proof
672 bytes (Bulletproof)
Memo
5f4762dc08397c7476a92a3b0023458e215150fd7e679da4116c55f9f700234f4949cce530cbfae617b046d628d206cf5ee77a457ad9e369e787614b07e601054adc44edc64e6440c0e847cb418f8cb7d22258b604ad7add5be798063e33445222360333ec9a22ca739c0242218b52edbd83eab74a69b9324f336df3f3f0b768 (encrypted)
Stealth Address
b6c411d25447f869454106ebf09d3823aebdbea27882e5eb96b884bf9d01f358
Commitment
620a98724ee7e0852acf28fbab3279ae94c9b68c52f3c7ed7847a3d223f20307
Range Proof
672 bytes (Bulletproof)
Memo
6b2e4c5d5df0e9eda931154b046bbbc1eeaf5d0f53c28b5c2440b8d283608dc6583da2a1c120e0725f32c6e1a4bf255031b7f8da4c4c05b9bd3f1b757d4e53bd6cb449d3f6204be13734caec654a89d5398980fac51ed506f0ca2072b2a38985f1ecf181e0b829542331f655a0e9afd2af133d067a48c1136b869eca095efcaa (encrypted)
Stealth Address
12e9d0f12155cb0780032ef9764a5a229220e352bcdc8fbfefb7e5acf6efa51e
Commitment
2087adf49d496e914aedefc6012bac5c2b1b95335734e980a5c99ad8261c3d62
Range Proof
672 bytes (Bulletproof)
Memo
c5670981efbc27ec631583b0d21fba1aa3daed6c3067ba1128200269e526573ce5fa83e3dea538b4adb994818396e43006c0a7c4b96417aa93c69710b0b1935cf5ffab0be95ecc806c8e46df7a51c535f31d5ef9e8d72d9e10ab0ce3e70c7a8a88504ac3a8ae7827645e2449b4a2024710d14022a16630a10e41858ffdc08b92 (encrypted)