# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
e4b1af1db83a121aeb2c7880a6d9c7110e22a4be3b7476575eaed41567b71d0d
Pseudo Output
246cfb3dbeea36ec01e27e2bb4a6f3d0f2a0e08adc61c0789e873e1fcd26201e
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
1ef4cff430ec6d78c83eca0b2a7cd35cdcf10043e0de41582fc0c88c03d35317
Commitment
6a25645ea6fdc0c5fac0a266a965ebd369891cd1f96b5d17caf931e8da4d1004
Range Proof
672 bytes (Bulletproof)
Memo
d6dcb59cd6bf4ff21295dd6ba1834c15fabfca88014dcda4b929cd6c54964aa0671986eae54f7e63b06a7d5d420974fcb0ebdf569191ac5180f63ef63405e1eb1929262cdc974f54df20baf5b2e6d3c1fdc2aa3bfa7f5c88e42d3033ef2547dce9718f5dcc754bda5c83f0d7af4676c40a8766f5399bdf0083ed886c8742c679 (encrypted)
Stealth Address
ae720eacd063b1124d257267c96fd78e802f6e5d72089726b8e52058e232174a
Commitment
22081675253a7574293933abf3b3faedf1f8436ac43f7964d797fb12432eb926
Range Proof
672 bytes (Bulletproof)
Memo
3a6e7796bb40a6ce286fd75d1c9a877fc712ed911b0d11287bb203a92f9cd76387ac2a92d5e6b26a447edfb25b49dcd98499375fbb0d992d7f944c4cbbae60aae93fa771548069174b0b494730313528e8c676bca42955238f860c24fea9bfdd946d88eb9b9cedf3d54945af68393348a39996db7bb467e8dd0279659dbfb1f5 (encrypted)
Stealth Address
76ce709477dc4cbd6ada3753d733be57bacdf4f5eb5c0fbffb9887e31cb77074
Commitment
cec2b31f3372f69b3eafa7888cb3b51b1aa4691da76e35cd36d0f049bc035871
Range Proof
672 bytes (Bulletproof)
Memo
cd79535b23507aee3ce829e0c83b2eb33c16330e40c1897ef233959451f69cec6a255fd26e826e085dd9adb2d9e360caf3b5dee26218b87c8df23f468e935d64e09e97a2ccd2f8fb98b446ba89e193f726c15ee6ae052fe9dd41ad53e84df83fdbc38de4ee0bcece67826f2006b1b2195b71bd1b3ab01652a4c95b4253453723 (encrypted)