# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
fa23ba970bf236d84b5fa255d32f0752f9543bdbb04696a81c367bbc2bc49e4b
Pseudo Output
b6f4c72742e4bb3dcc76dc4a9312a565234800c37b9400d9d9e58c6fe9cb4242
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
c66ae16d5db56ea5fb466a1373b24c0538b289b8a2bd3d1f49be8bf31b94b235
Commitment
1e0e9caa1df7aa092cd7cf01fba949de3e3eca46562688ce0efd9836aa95f057
Range Proof
672 bytes (Bulletproof)
Memo
02f50553353247c90acdc98ae6140841954680dc175653ba435a32d3bc653d30fe39ca92dd9c91b9d57f858af34a71478a2eda31acb0aecfb2f54219e8f146f9d50fe75f164341f1eca3666efbaee0c5247aadcc49af96aca9537c8d3b07b9bb13bd588bd279006fe7674947e00c0f5441d9c7271562691ec757421e3fdafc8c (encrypted)
Stealth Address
781e1c450ba03d111dfe74dc22ee7e92759f479c185c70d994181f714522c466
Commitment
36505c6a1d64321f941d249a3fd8e1ac045c4e73732a77c00c8247288fc88309
Range Proof
672 bytes (Bulletproof)
Memo
59ea3df471565d1cb323acb1de3d96d7a53743423264fd0d2dab37014e420b309f0b41de1b2fbf244cc4fc88319df125b442d01056daa4d0a13c9896be69d3e1e2971fb8b6683c2ed8eb63cbc187faa9af87ecf13031dfe01d484c02e458604386e8e6456a1aefabf0f8545e9c1f7b74aaf6e35759b30c22eaddff37f25d1a77 (encrypted)
Stealth Address
3e083b3bc82820bcd80f8de12dd14c988e3b348d19729458b75c2a12d12d8974
Commitment
04415d655eaf7164110057b75664b1aeeef0315b902ae7a8c1bc6e0921ab6116
Range Proof
672 bytes (Bulletproof)
Memo
c797a80f29d24ad297421c9ff2b1590933eada4004e6e46a378bd0cfd76f72dc635cb8b98d39e1126a51d4c49a1e8612fa977aa4f085ca14bb472b3d144afd52cae0315277953a9f359d0a091892e8d85ff7a12e7daa4f7a0ad808ba644a9f9ce456b1533d423ee1922f3a270a5951956160cdc047b303c763ca8c6403f1a32a (encrypted)