# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
2c8e0df1b3bac2a37bd066cd4c304074df3f062032bec4a2b3111f33008b9b33
Pseudo Output
ee7e0bfad7004d3b08773b515b71689f42231e8c394bc6a1b50a6d1cc7a8eb49
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
a214f000f889ac8421415bab3dbeefb009a934ad99bf37e330a686b92f97ef19
Commitment
f8b68d91b735a43dd6191d0ae126ee9406a54f1554fe6a692169974f6a55dc39
Range Proof
672 bytes (Bulletproof)
Memo
9a6f98233eab632d07d942324ff8c3a7259db2f69489b3cb1933e8b1be7484a76a7edfd8e0aef77a9bf6fa2eeed62dc1c399fee3307ada471e866788944f0096c83d7af1d8df808758bd513a967fb3a8cfdf97d1eba1bb0bd9ed35567426e79e6fffa97241b0f65c9f63cde60b9692736a954f0b0152a46db27041bec36a0e29 (encrypted)
Stealth Address
6e884c4aabefb6e28e49cb6908a38b0656d495acce9d8f5062fc1bd1f7600b0c
Commitment
4c91cc8dd45165a9ce88a41550ba8ea495037350e9db1739ba4abc76c4b91a6c
Range Proof
672 bytes (Bulletproof)
Memo
2861760487304cabd1abf4317d1ac89e48e0ffa79756b982e81be21be47dad6e3788776cbc35880a14f9375cdc12d815b9933bf43ba6fc8c472741817758351f5a870901c15cfad8ffaa897702c5753ff0ed854c5316d528783c6f907537e7e6c5cdbadf0c7e64aa86954d2330bd9afa49b019cdabc422ecb8c4b5a9d48fb240 (encrypted)
Stealth Address
c40a3bb73bde9cf9aaa06a3dad051c934abd12b574cd583b7d0dccb0858ada69
Commitment
742b29e805069a51ac2477785af1a85dcc71dff624d0d8a7844b701998f3e637
Range Proof
672 bytes (Bulletproof)
Memo
80f8c1a46b09a716a1fc7f41755e6583b53e5d7b3c85f42b53f680cba6aabde4f7410ee8ac82d7ba812dbb864a3cb4fee8ec7f93f135d8d7c510434b20b003f3b290fe84e3cbb4a78e401789cc2150983f8959493a29c1279c7c995dc37bb5c0a44c105e3512318612ae2fc7184976827d18528c4780e96d651a0063e921cfc4 (encrypted)