# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
f2b2be3e0f70269efab6cd1faff155b6cc9a981b961759064b862769ecf7bb2e
Pseudo Output
eadc5766898b536ab11efa1032148e68a43322d29dc13c60ab4bfd909947d314
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
b871e1cda9c44f99a349799f7e5c00a50d04644c80d6157f5635a72054303817
Commitment
56733a85e726b3bd79b7b3d0602289125976811a17fbc280c69c8b6c7711932e
Range Proof
672 bytes (Bulletproof)
Memo
de03d09e84ecf9cabfcca2838bfe5851aa88b923db1389e57625038c1a8d53527d3f9b350453cf75a3d2dd374caa39383786572a79b346667fa0f241a7038050654c66f6d1f12070e4d719b0ca49c9cf8f5310f46942e129bb0372be9fefbe2cc25e33f3d88facb123c609b478fbc955f0d313bf9026ffe50bc5b09746015541 (encrypted)
Stealth Address
6246b23cbeecded05ab22861b068b680e1a5aff9c5defbccff2acb7bad1b7a61
Commitment
da0cfeaa3d9275162093d6ade1bf38eed42f9947c6e7275381f43e64892ed71a
Range Proof
672 bytes (Bulletproof)
Memo
cb1923de75b7bb891ac38708780dda1159e30cbf5400bd58080d84b0b6d1d870524f9097001ed1513c40b64d65eb7e2e3b13086b3097950fafbf5d8a1f48e975f2cfe7bcf97d20168bdae24eb04db07171d5c08d77c43a6f9c9df6399b65909d7556fc574652f243eda57f291ea55af7964d39286ee6001751003684d87ec87d (encrypted)
Stealth Address
660b64feba7c5477171d2800dae1723cc5ed3d2bfabfe3a1001f9b82a852311e
Commitment
002df3942865a639c486631ff30d34d202c91f075a3e60e04bf3dc80474ccb04
Range Proof
672 bytes (Bulletproof)
Memo
bc727dd2984c8874f57fbd19a73b7a9b0ecc91e4cb5548b4809c6f4422d362f01653b8fb066af64db3723cf7133c625d3446890da1ee5daca5c32445b4d6b5c58c58c19bec86a6bbdef9e3105f3ba5598b55baccc5ea5794f48110c890aac574b034da942b448d1fd65075482765af21e068348383732d631a667f76d04d809e (encrypted)