# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
2e04858f4456cafa2edef67d0af560c2566d155e5c6354df5edb808d90cd8109
Pseudo Output
a280122b8355b2a60298a06c7917d4c398a4d95efb13dfe8ad78426249cd802f
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
b471422cd0b50e85ee1c066c1adc87362eca2ad265626b3994bea5ce96ce3955
Commitment
6c655652f4ba0a7d94b90d160c3039e7cb3b4598084452820057d1c14134ab56
Range Proof
672 bytes (Bulletproof)
Memo
4c262d12aec4beb9fd6f98a6a002fcd715833a2ceed65faf1a7070dc46b7d91dc5bd48f4392b7473d8313e78ace495fd6f929324c7966d5d07ea8524ff5683dfc23587c91580b7daf9ff6770c5d73adf5df58db16c424b5eaa4749865f708cab842edb19547330003954c628bf546315170fc0c7fad310bbcf4fb08eb1df7c74 (encrypted)
Stealth Address
f8379c7eb3e12cd2b7ac090700d38e07d8140826ce3350532c3e5729979bae75
Commitment
4e7a8d99addfdbfa900affdc96befdb2648c88ce9aa5b39302d7c638adfef133
Range Proof
672 bytes (Bulletproof)
Memo
25f3c76009f3fa1fd1e02d4a199af97c9f21f8c5a703e47c358bc35fc87d8102bc1e4cc2fcbdab7578d8963e9695b6493113d727b1bfe975380ecbbac8f5cc3733546956f73fa31289a54fd713753d1864a520639a6755d5106a4e8da5603f2cdfac7f56b1fb902b328df0e9f0d7acb68c4d2326bbaefba571afa96b09366d93 (encrypted)
Stealth Address
d435b64e8b1c2b189df124565a6879414fb9063cc5d979ece4fbc4d8fd5ac226
Commitment
8871dc48efea21a6f18cacf2c2672ed36dfebe7e84909876d05b14fd4b3d614e
Range Proof
672 bytes (Bulletproof)
Memo
e57502511ca74f6b689c57856cde1ea8c76f2282907d40e24e9c327dd8574d54c9d42e18bb9295601138bbbf69f5a9d4cdad7f040054a2afebfc3fddddbfd6aa708154a790b0aadd1463ec3ed5e12343410c143692781ee36413c128c3ea400d7b0b9010e6f07ae923e6f5f5984449eff0b6b29950705cb124884418939b83bf (encrypted)