# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
4650d3780676076670bc5d6bc6c4cdf1c3cf771b63f56ec7d1690453ca23705f
Pseudo Output
6664675d7e495339dbac69a1e828a24a1220c8ce4789d96782d9401d7077d638
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
8e9ceba3335ada4555bb04ea78da9208ccfd3c0de1fc772bfe9533736778db70
Commitment
ec22743be032647d1f24a8940c49baa853c831d06eb7db327b254cb20903d366
Range Proof
672 bytes (Bulletproof)
Memo
b2543355ba38dd55213373a22e3f974836f977e20dffaf7453f1537d44fa283e07b9972149b15b233341402f1d11f7bfcb67de7e76806c4a33ff7c053b330b6e8bdc6389141471c736d1ef79f7ee30a438b50d7a1d427ac37106716bd9a091691c63968a5ce3fe37b0f81b373723bc9981c63a147724a79365e54127213a478e (encrypted)
Stealth Address
5eef3d88b5a6bffbc9f56f4c6686ff3712173942f15c775c1511d08229c12956
Commitment
e2dbbf3c542f6b5df09fe92e17825074a94b0c54243ed4eaf815a2d4b8773b45
Range Proof
672 bytes (Bulletproof)
Memo
bbec671133ab0a1b683d2de2367c87810cf3ba2e15249073d4272937dba2b3cad6eeb8e34a391837e23b85c4987a0b1f05675ee110136887803c534c928c7440ef1b57abb62c45be21a567a4079e40b08a8a06da393640af81cbfd38a2b00f21073b923c50f4d965662023d22ca0d5f3d4ad629121cc92f1e231d4d72ee7c975 (encrypted)
Stealth Address
08fd8cdf36032e2783100a3f1963fcc77227f931aa76a3a617ad500cd703ff0b
Commitment
b01627c70b09a3a698e9c55be10947665c95896a7bb0d450907640b180cb3301
Range Proof
672 bytes (Bulletproof)
Memo
9381cdeae6d07aa8e596a32e446aa514ade2a81a0e4a6b8b2d401a483bc823f657920f48e000550b3fb0ffe4e81fe3095c6a1b862a5554da084b6ee4b76257768f16b4771bbab9a3aaadbb47d179968e8535a2832cff89ea59d7035d775719a63bbb4e6c5ce0ae5a17f4b01537850bd25a042f5ee51705abe7d42c869d396297 (encrypted)