# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
2e62618277a41f4453bb3820153496f4c29f6e01054238b754c104e822394354
Pseudo Output
b2c2e0d8f96da625bab1bbde43660007f56479a9edcbaa84093cbdd1ae3c3d72
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
c80f38e19bbdc46d37fd0e2358eba496819944e478a9191a1c4dbdb3c757c17e
Commitment
b6a34a2cbaffec68b75254877f59c15b25a7e77fda9bf14785e8b851e18bdd00
Range Proof
672 bytes (Bulletproof)
Memo
2f13eb33b502109cf118594666c5f7ec5db91298b00517f03fe62b8395b60470ab8f385487fdda35d8fb2703297bca1a2bcf1fe0225563bcb1654cf3c9d852464f0ced405fd6a5f28a5b5b6e0e5ed34a0658315a0f68da49f2d33869dcdc4c5672f82da15908a4a00c2e76a0fa385aa367a516f769f054e79d4e837665105703 (encrypted)
Stealth Address
e05c3650dcb7e057dbd4ef27c6452d0c8e1a00d7df98431459fddff8d2d9a976
Commitment
78fc1db5e3e1f80709f9e372d28498426528e04e2bf615bd676dfd94f1028e39
Range Proof
672 bytes (Bulletproof)
Memo
5aac80f30208bdc59d7e83dd6a746eff61727cc5c9e18b9b714973cab88538313b613d2b8303e1027b6716737de73b02d4613553d33b43ebd22cd675aa6a965537c1bec7f0c397b3a2456d8429e655f4d586c46fad2ddf5cd63767f86fc0d38b684202291f7efd8b22a9d7d8dc3e84ccf7db37a8c7ff3178e415785a705e6ee4 (encrypted)
Stealth Address
a8f03c6c9fbe0c4b2579f6c8b8eada398853f2021344a24536c4b93aefd34f30
Commitment
f630c6bb2e77e1a08594e47f4be90fc8218f5b0ecca6256cc8f35f86aff45867
Range Proof
672 bytes (Bulletproof)
Memo
fdea1c69e1caf1b93a8621fd1d034d3e8dd5416d7acc5cb21d080255be08a7df931bcb4445d9748b90ae9d417238752a9a2f19688c767f16a240ee6752420f62a512e2b25e23f60af1a285c6d6450c60100575372cf7d7cd757fa7b238694bf751c316be063cd3afa30f4bdd3f0bc29a20292dfd34b33c3b3226277388108777 (encrypted)