# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
16b268b512fcfbfd42c3518d2c31dc0f402847be35938d4982daaf20b22a652d
Pseudo Output
8038deb95d7cc0c23c77c425418c7b716e8d25283748fafa80cbd1f584980c7b
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
2cd37f820c5120d962673c24e230b2be58f50cc93e2ceb0bc12d78eec825b936
Commitment
641a1bf79b50f9875b190fb99f95fa7a80707544575a9258d2626de63945295d
Range Proof
672 bytes (Bulletproof)
Memo
2f5535b7b933de0e73507616e1a07c91b55cddc589eb6e66c7b4042f60975ea556fdd5dae6dd1abfee86048e85fb2d9478afc4baee7e9c0d4a2ddf2987301fcf4be0f396e114b8956c2ba24a577fbe76c52fea48252058bb0a1d6de5a30e1011a3c977117282a64acd68a8c1b8b45e5d7c174695d45f37f1a484052d64d31996 (encrypted)
Stealth Address
328542d635ba206408f6eda5dd21be0bc7c07738afbcde3739b3f9d797b55900
Commitment
b2d90f12477c0c0bfa6c119b84d88a47cbae47942b0b1928aa5bba83e22f5f0b
Range Proof
672 bytes (Bulletproof)
Memo
9d8927e4dd090789a1fc46abfb65ba5adcd4197b10ce95c9942b515d90c342025484aea51cd83a939652c17b2974ffd211a3f524f29fac3002efb4fe147c18f344a440b8c4aee6ebe159e6e477f253542518993f7b9671ad8ee738271bd26e5993715b21df3ed94b5e72d680018b6c7a67395499f6c0c4925c49a3f0bd6a6f50 (encrypted)
Stealth Address
e4b8ab3fb806bba32de489d092679adca59267a47e1117f11a688df169c0a305
Commitment
f864c8d883fa2ec63cb9a48b50009403133fc9b480479941470a29dbd2ec6870
Range Proof
672 bytes (Bulletproof)
Memo
c0daf99708d6fe9353f849d4f1c448186a2164a6812d060992190f2e4b8b4b57e0e377d81e1ebfd8a404345b0830b2e69b2e2e186602404fc70849db734df27bd1f36f9d18b4a70b1a5ba323b5b35c4879483d28ac2da98ecdd9d11b0340705ce26a4e804c5399c68af670d305d5720cc5378460b71d40cb87e554fb6bac6123 (encrypted)