# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
fec0b8fedd0e751e2c561376ab344cdda11ef995ad7cbf0309b10154e568865e
Pseudo Output
321ee07e936a5bdbaed16e11ca1c256f9b990f335c30b45c95f98bb5fa797a65
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
a401e473d16ae085e26ecb59d82654d23d18ffee1ad162214afb4ce7baa77234
Commitment
f4e5d8c2d45dbb13dcd26916c09f5b4403d13638c35ae0b147b23796eae79275
Range Proof
672 bytes (Bulletproof)
Memo
da2d84d37c1c9b8cfdc7e4cbd09150c5497ca29f3d4534b09fa3f19e35d7cdb5df3ef892bcb64e8a4e3936df2cf9a1976c8cb5cfcc032affc669486ec2bc897bde09056e6eb1e1e25d4c44e7c46c277ae1b6429e73bd1b4e4e1ed3f6bed126defe149f364e6b949b5ebdf0d43838cef9f9c9ab361f53d400ee0d7970df8974e1 (encrypted)
Stealth Address
b66314c927da84620f94d365d150ab8c869b3014591076bccf02796c77b30b6f
Commitment
7836583e23135d70ba22a459c8525b136b36b19cb79fa9b84d2268e90c14577b
Range Proof
672 bytes (Bulletproof)
Memo
bfb1c9024bee837bf49dfdee74b72932e06fc17039aabf33b5ff834844bd90ef8df20f1779a6e695454f0efd92f144cff1d875d2ae4e31767ae6c4465d89224a3ff6c8c0dc996dd43e3250badf4027627313d4d5f127d95f92e73cfa90b09098fdd506219e8ab75af798f3b405b6b85f4a6ef013774f3c6cf84a699ea422c88c (encrypted)
Stealth Address
8ecb071a9a739cdc03d2097c18810ec1732c53d72e7801a93e47b75608a7ec35
Commitment
9ce503ca1180c2429e8f056ab034b740af4350a01234ce4a63563eee24c64b4a
Range Proof
672 bytes (Bulletproof)
Memo
ff5330822755aaf54c202f9211cba0179c902d718214868c47f2a9ef127de1661b51e458bb496d74de5b25f908bc31f7475f541688bc44d355ff74fbf0dff0d646ad766dd2298790a397518fe7b8cb2074bea54642d548c202ee353382cfd0dc1e28fec22796c591a4adaca60ac5dca4e08fafca856921701a2f57a04bf99f7c (encrypted)