# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
240ea7f23b026ce9b95696cbc2849b211aa96c71ff24a7fa8ee30a2fe2676513
Pseudo Output
94bdd47fa09727fb6af7b6406281f0df412587981d0e531b56d7c44fcf97b973
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
2266fd2d42cc76ea8f2aa330af0fcf4c00e06740ba72bc69bb45779e56509a40
Commitment
9c0704b784348a5e2c9aebf3bec1dc3ab26e2140a0c0665bdf0fc2a5f1959e69
Range Proof
672 bytes (Bulletproof)
Memo
fbf0aed2de057ce42e92adfa8ca96dfbce05704d173107682baa3181e83c3a22113500acd6f7242205473bd53db24ceb23882961c14e29d7b9110f5d79e00391cf79223f46b9cb308f2d3dc3098273c490d5626bd0ae244cb5d9489a0f63f9c5aa8ec94066168812b36a6ba9e579ffb2897b584441b2745facda3ebc24167c93 (encrypted)
Stealth Address
9433a827ec2493541fbc3522536f7fef9ef5b8ffef6d4761c5d392699f15b923
Commitment
4a0f58c9545c2a1691444ab86ea6f9b23733b0a871d117f89980aa7d4be2eb26
Range Proof
672 bytes (Bulletproof)
Memo
95a87ebcc54491c289fc3f571be7481485f8c371fe192f723835951c36e63c7ffcfa71e1f198f9eddeb0675c12d797f41fc48fd99e17ce3dabc8dc34513c05e4ccfc3546ba22dbe3b80d933e899056d00171b216e3ca115a42f8a1bf19946d29e53922ff9cff3c010e46ab84352adec24412588cb22c3f80505a9a2962924b3c (encrypted)
Stealth Address
f668bea0086e77194ac13da5ea741ffeab0b1637b168ae22aae8a9654405a202
Commitment
14330ffb686805aeb510bbdb317221d160a133e38e41d33f4c9ee82a2915696a
Range Proof
672 bytes (Bulletproof)
Memo
d7f1e77cd4cb3ca8c8eade2755589bd5c2b482559dc492b4221707e0c20880fd567eea6ebc574e2b27b15cf763d2c31e37e346dd66faff6f79ff42fe74b63c8473f6a6cb15559bcd6adfce771b0de964b78abafb6a96de54588181dba0873af008d54662ceeea9b1e4662dd558d7f85e9444943b0aba24cafa35e99a49331517 (encrypted)