# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
4650f907156301c9cca49a7e04b7c1be7d787f95804e6ccc827c6f44e10bb439
Pseudo Output
fae9e32f636b10e8de9a4b69ab8d74b272cfb44a15b220e9872cd4559bd15453
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
b8be619160a39d35244a0ff458dc9b52bc3b13feabce60d305d22427257b427c
Commitment
2ab1cc1ea343bbad9643f92e7845a56afe40f0ed81cec330109436a186b77169
Range Proof
672 bytes (Bulletproof)
Memo
38bdb3e581be36798f2b0a55235552e48434a595ca3fa078ca9c9ac35ffa9c2c707a1008d278add5f2b0174c0fec16e9edeb886ec58866df8b353e720ac1d73b8c35686b41ab5fda145e72b38ee88dad2ad00bcfa5e1d8ffb303367e6bc51e874797b2cd028aa99b195943d94efa5915b39b08edd9c58726c4eae1f69f6dd2ca (encrypted)
Stealth Address
f2df55fa3bfd2a7479aa7339a0de3e40591790b01786be8b58fa892d899ab41e
Commitment
c4fd6f8c4abdb90c16fabe80e91e6473e970501e5ea4c53c8ddff9c330ca550b
Range Proof
672 bytes (Bulletproof)
Memo
1f035e4c9042c955280eed6e709e879c66f4ea9c8d11ded0e8da0aa154ece1ecd21b3a9a912d4c227dbfa8f954adb96daf3d604c095b42240573b0b16a2b0a0a2af07331b77e43f96536389adb71ea0ebba25f69c4084f5d3138797c5f0a6ac79f2adf31278d2ec490df7c1fa9623c06637423f3fc1b48366f997f900bba80ca (encrypted)
Stealth Address
809eeefb642e4226c218df539b52e97c2332a0bbde2beb1f2e94a61c8e95e56f
Commitment
fcc2e33c059af7fe00cec7adb11fa95553a6926ee530c6aa2f9a4bfa0159da5f
Range Proof
672 bytes (Bulletproof)
Memo
76c1d9eaa72cfae481bae5ff7f8aa09b7e279f4eada98a06d5fb4e4f3a06609b4722457eb2893f4de9395188e55392631c597dbadd9e342545dd717975d958920f20cebadda8f79f621cf7f795270851e408504df534216281b6ef95cf5b8a07655e191c3be9a3db4baaff014701391f3efb68859e5da99169cf0c308dc4e30e (encrypted)