# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
20fd00f5559260b854fbbad06b24b9199e72382f609013395be596ac6b103d2a
Pseudo Output
427977ee0e130e16c33b27f85541b2eb31ce9684da4cad983b03278c6b4c2578
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
2edc518251f94fb88941fd2d804091308b36a1cfa3baca9cd3f1813e476fbd6e
Commitment
64349c6031eddf64e938cb0cf16b055b1a578719f276de2131218cb6d5bc452c
Range Proof
672 bytes (Bulletproof)
Memo
819e70ea1b37d2a3e9873036fa65e70b29279216d21c00266adca267bf02877668396cd0c300b16525e6516f634f7a7f36c21d38a37340b55d11698078cdf0e374fa0f89035bde7b098bbd4948a6ad8c550fbc98b455ad2eba80b1bac54aaca268c8850f64ab8273fc00252c372b8b53228309aa1df86f675f50abe285c3dd75 (encrypted)
Stealth Address
7694512d0513fe7c58b5062ed13fe9c3c54b245fef7abffa4c53546ec62ea603
Commitment
445a7129ab09336baaf9bdeed1c68c1418762204f646782d43b827031c73dc00
Range Proof
672 bytes (Bulletproof)
Memo
aaf76ffb2825cb6b00f811011cb2b51ba1884592d543b84545b6360bef42e46b4f90c237c29bccba86fd5e11b36c3b31b29c1ca1c5deecadb591cecc1d38c40ff8546c8e610bf843c58a6e165a024956054ae048c3f09eae76e6ca08aa4375dc1970c6ed3e3ff5b6f1f7bd955f0dc698d1891c3f6a900409a92ee60003f68cd7 (encrypted)
Stealth Address
3c2956721074d2f8d5aceb2f2376f303201db89bf8d0754ed600f27049b0cb45
Commitment
64584dc16330f4bf75a6b8b4a510135e8cab22a7b1e209959871b111a37ec67f
Range Proof
672 bytes (Bulletproof)
Memo
11e237be6589411f4c2af88a1eb7ed62d5744ac05d57ef6a38c379b3b347292d225ead3172de9494be2ef1738b617f97e7a96a31e7e7625da5dde0cf54352635081f98aa9413a8ffbb318dfcbdb5be4da6cec5eac980298706fd38a86e6e712f5d629f9f4381dddace05bbc1b54e90468453a4068ccb091b96416a55d27a4a93 (encrypted)