# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
2e1a6c65ef0cb6fb634bde8ab3ce5f9bcfab83651d497d2cf5a79d5d35d14554
Pseudo Output
e8614645598bec8355aa3b1f78b27aae869df880f7cd4d94f598849d9bbbd258
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
b63bc9cda59d6f609b493a77e0b0fdab53087adf813bd9b6bec3e2c2551d425d
Commitment
d21455ad002b35f48151cd4f95726c5f4fc2365ca5d6a64de6cd0e08d3210510
Range Proof
672 bytes (Bulletproof)
Memo
b2e24316f521e26781fe9bfcbacf2ec6d4d6f783429efee8864f217631312c47a4253a0917294b11d171639a4bfcdc8900901734fab1721446a983dd3f49a1c6a6b51c28177d6e8807670a9f80ab84622506245872343b3f5ebd9122f74f8f10d20279fe28385d9f3c51319fc69fe67bb0f54e507ae50fa558a0936fcf8d38a8 (encrypted)
Stealth Address
4277595f5ccc9853a551b167e0f9c08523e4af870e993e26fa62237f97fe7372
Commitment
20976c6ea7e411ea9317ef599b5a7ef02da0ef9b7e96ebe31afe79fb6ab6c46d
Range Proof
672 bytes (Bulletproof)
Memo
c3839d1fc7ef192d72dcf18b05758aa9bd02939406944000b536d0317e636f0a00029e903964a44e7f7a50ff5b2388e5bd2679633fc7603ec33309af8ae55ff42dceb319b8232d396053aba47bd13e3cd23cbd66238e374a962f9631ee981c5a1660545a131336bbea9c569e624de404da9205a72b1f5a755dc5894f23419c42 (encrypted)
Stealth Address
da02d1360a768775c1525febde1d75cf53248c3f0c9723362e8919a1b77ab430
Commitment
e2a2646aa50c6ba1baf64f2514c6c3afe49c9ebc2b1f8c5ab1ef7e9aa3f73b7d
Range Proof
672 bytes (Bulletproof)
Memo
e4f8dc3a38d417b782cc87793a58b8313a2ed711ddddb3d5f3c57e73f27c37f662a3c0017f872f3352b756d6a110637abb7ff426daf85ba52f683d6b8c05fc7530d8e6937f5b4588ebdb63eb10aeff94d436d62e0bd943f72da1c3672c617c172b93bfc2960eec00a68c86367685c2f90d10e8cc51bb1c2e5a7a5af90c39454f (encrypted)