# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
2c8d63e2813a83f80e1639e9bb0a25977043d8b01d731dd032457b1d0d521055
Pseudo Output
9c2d0e27b93531227a3253b4e688fb85b752d17daf6069e74f563432ddbe2d16
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
14303c77c73fcbba2dd88e8b89f4d1a10ce449c5ec87a6de61addddce9709562
Commitment
208642ec12ec5e4cd84898308d2122e32802cf8e35d3d9d8f64b7a109affa366
Range Proof
672 bytes (Bulletproof)
Memo
6e8d451969108fdce2959f8b2ca01647350ff5b22ac855630f8e4c71b53a3d2a637e7c0150cc1a518d084e2b58ef9f4648c5cbfd94c506531faf1a9ff08abecc4a6b9158f883260087de2b4132cfb8d69400fafeb5fecfae6b7407979819f84ee25292ea7d62d1bee37f41764948c8a4be9648d708669fb18933fbb28c8dfc91 (encrypted)
Stealth Address
b47ab32575e5cf34551490b871cd77087f90b9b79cdd46fbdcf907561639ea09
Commitment
94d54dcbba44b3f4e7b8d0cbb43d1d237788b3491563ee33c9c293e689782866
Range Proof
672 bytes (Bulletproof)
Memo
26b7836ff0ad51191d8a4fc54e6fb47f624a3e7690ca245d6c510462f03af62e371bf146acd187103023ae2bbaa3d005a878e0d82d9e7919aa2b9e87abc608c8d9c56a8990c862e632f6f0eafc039b4d55c232398ff9f8c5f3db269472604139169e3899eb8885e9269bb4aab6d7a6c4b1baf6ca630b1637af3982fdf5f025d4 (encrypted)
Stealth Address
a6767f3cc0280449f8810e736000a14b1c55ea3b2c62c00071cb0040cc1ef024
Commitment
2eac06827bfe43d719f621c1676de364a2a164d2fd5ad606dc9fd437fed81472
Range Proof
672 bytes (Bulletproof)
Memo
41f2237d1c9cee834d72ef0496f0d7d77211f5ce15594fc7b67755863b2dc7a789f6008cc5b805ad071715ab6670d33f0b2d3e81b9ac6101fec1fe369e15982977e10e241b6060a3b68fb0c25877e923b3a19fa4e6aada8186ce6bdf452f865f47f997ba8a6d929d0da60d07cee18a54870e2f14bbe8d5d66d7554498f21bb6f (encrypted)