# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
6844f5b297b955012b7667c32f74919809bed393abcf57d33ae54708fc275e6c
Pseudo Output
74d2fed836c844a7846adaab4b755e06311b335a3fca00ea7aeb34ff21cb9e1d
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
eaff4daf6220293fa5039870c02532cfe0b98d291cf218ea4964368751b09a30
Commitment
a871d18fa48f51e6d98fbc76a29deeb97e4d3e4ac780f91548225b84ec003b2d
Range Proof
672 bytes (Bulletproof)
Memo
fcd4d81203d8ed74f1b5c90ebcb12ef78850f6f981fd808b59d67291230f1f270846731d4f31b94c9398d37a5c59b0248de0b31c40b8e8f7a02a25c490f6e90355ab8bbfdda831f073d3f2efa345e56229299c1dc870d04536ab0d5ef48919e8ce5bd5588748649dc578fc2d37a1441fc562b2abc087030098ec2a0ead5a3e21 (encrypted)
Stealth Address
c87c250cdab7181b8a2c957d00977ad67adf8532339ee26789425a95721a3a21
Commitment
36892c0dacef85eca08b0b00b8ee6348265629816aecdddc0848499c1e11d025
Range Proof
672 bytes (Bulletproof)
Memo
9b43d51c04b129b729464fb87a89b067bafe2e7a575f6ed7ba2a07c5876c9f54fc0adbfd6d9690c0c54d23109a6fddb99a2d1cbcacff969ccb381597240ee6ce983c98765ec0f533aebbd2de5eb9f068711ef070462b1f8a4647213a6772f3a28ad851d9449c363ce94991c39dfd4e8f7e69bc4bee53ad0575dc047ffd28dcf6 (encrypted)
Stealth Address
e22ffb9239007c27db2c15896f91ff6feeb6c5820dceefc6a9bb93cbbddea032
Commitment
a0e4c76fe236f293e450ec0b15182db950701f9159765f70a7db3c662234bc5d
Range Proof
672 bytes (Bulletproof)
Memo
f35e1207cf365e5e2e6dd120a40f5c2395538162425afc41690544417eee1d2571d5abff44d402de961559edc4cfbf5a5acead72997d16cf5d264b78e2843d193ac879aec6abf68425182be495ac693dd994cfe7123b2c07c47401e10af007c59fc4dff6f1db65a86cb46a0ff3c36d1e067392f04586a36c31a2fd7b1b22586a (encrypted)