# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
6c3eb8af196f4ec35e9fab44a90aedf22493c3e149249b882141be0349124414
Pseudo Output
fc43b3742fd62409b33792ead337e34bff4e4528ac3580fcf22db594a846430c
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
e2233a6ae85b284d940a73a6cf5b6fdec02b1d25ef5cd220263259b50efe6c39
Commitment
14415cc803e1e1b04e4deb55bdd5ac7c335cdac689547e432d4f61addc078d39
Range Proof
672 bytes (Bulletproof)
Memo
5783f0bb2bd79f039ac2717eddede106bab77198f6d85c1b8fa5817c2bdb7ca24eaf38728d308b6eba672997d919e4e607951bab843a13aac824a0086febcee5fcd5a6e692c757a41510708bf28261f8fd130a01bb8dd94582d3114c74092cb0dde6cb2a39d24b3fe20815940c3cd3fded5331e6e9aead336e57394acbe8484d (encrypted)
Stealth Address
14bca5cd38c28aa124a85ddf0f2ca9365513b0ab31c0317d2096200164cb9a1d
Commitment
0abf77588d61dbc1abd9b9c3443a0d185b37edc6f267d1489ed5dc7168f10752
Range Proof
672 bytes (Bulletproof)
Memo
4f74c038f1fe60d6f7b0e2a86679582acd4422ac5b0f5f597b9a41eaec63462079cd503b8874f0e0cf5a99385865635766c5d1f5184a59a0c95ca8dba4c0b76cf20960fd048726a5f2c28ef4ac362ef6bc4cf45263c188a3df724b407735683506c6e091a663155482173a7c0e3bf96e4dc9a602d2ff985fae97178e63703312 (encrypted)
Stealth Address
b865a124bac5a2890923941bc5897cc0334a46b29243346c93e9e3cd557cf029
Commitment
2c64358c6617c44967f5001059c65e4f356d4054a7f40fd37fe17a0571947113
Range Proof
672 bytes (Bulletproof)
Memo
a042521da605895785babf41ac05e4bb5bd1d6e16362cf84042ae4c3f1fd41176a0ffe82975197f60762fe030ce750874cb0f928ebefba3a28476296e0109b6f9068723792ac36fe03b5d95d07bb2cb42be4cec9b6c4d58b1799e30735a3229e7b14adb69e08333b26aa87912123fd0b8fe7f09e758effc5d8f5e1b51ee7f7ea (encrypted)