# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
c070043e8eef0afed2360d910f73b3c496404c8d91fbafc95a5bc144e8253f1a
Pseudo Output
f87c4ab8af62a1014b08832eda0d2a167576984df34d7f7c9aed6e4ae9122679
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
2ad3b9dd6c19bc6860f51e8fc169c69a579df9943a26feef38939d73d25b2c79
Commitment
5c6296cb750d3a5cbe7e5f9578f60c999fe1c365585489b5617af692a8a67e4b
Range Proof
672 bytes (Bulletproof)
Memo
115931084ed6ab3a8fcb48f0d8fa2c10526ca73ef23c6cf9f08407ef1d8507da96baa873f3812e99e80455b224e4a9addee3c19abf469f7d00a61b7d5fcc64d72aef5a8a17c9a956f07b1ac7931bf187a10dc60be9179459ea0c98a133bdd4b5287b3ca17d27fc95c7d9f76bc08e1841af181d73c99b9f14b64819fd066e1135 (encrypted)
Stealth Address
2e8471ecd479d1a830a8100105b4bfb167194667ccd33339293f8047082d287d
Commitment
e0cbc471e11388dc71b6eebf717a28b0d579ebe39f060193e594cc3069a45a62
Range Proof
672 bytes (Bulletproof)
Memo
a7382e37a670f1fe75aa60bad37d189b13ddb45a34a42666e65a201ce257f61ddeb4412ae5d3d1895a6694d8142cb5ca97181afb9076a06b65828a3d92b1bda17a32dd3fcab99cd2bf18828c1ff5254a377624d7b6a841952741f249eb61263dc18242e164f4866256b088a1cca9c41d943c69726ae0c5d82b0ea5690a555065 (encrypted)
Stealth Address
de00164242b34351b04d8962ed3c5a44d84aa4cc9ec1b173e5f54fc4853f9208
Commitment
16e76189d6ab4e619f5e2aa9bbd9aedb7aa89c98207e6a485cacc7f72d82023e
Range Proof
672 bytes (Bulletproof)
Memo
1e2e3f4f6102b857e4318922172d89d5f3a03e5084f4b59a5eacd1829748814ed8a0949c101e49300a969b51360027a68bc46ea63b239655391337c119af960fe0a17d1f3510f90621ea002f714978c87f59a00a586b185ab7c47fa4ec874099e2cda5893b279e0f297a708ca77458bb724d46f46310d053c4492484eed06813 (encrypted)