# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
526b642625ed190e1a00597a1dcd99162f6b3cf4fef0bd0e90cc8817ede2270d
Pseudo Output
3cf661cd9df517e185da59c7cd7d2c755983a389362efaef8cb2af3a3eed0463
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
1e690b8bb5750dff6c2cc4d95d869cf11ee813864e7456c424be2181b46ec03a
Commitment
2af0e8121f4af5a350eb525a6512ac01e14bc1a45874c1bbbe83e44509e8281d
Range Proof
672 bytes (Bulletproof)
Memo
21a39f8dc451eec63dd31402c44c035eac5d3c95074557f7e6eb8bba16564615f30f9af2cf06d09976b4916657a614a9796dcca16eea042939d12c4ef57cdaaabfcb92b310808deee66a7bf3cc9d72cdd736f1a517b4bb13c6a9ec68e461b17c8fb97f149cb6cc68e505da45f9497146469d7c8c124f2af00ae6533d37076e09 (encrypted)
Stealth Address
321e14f0d2608e28a0b5018ce826dac90a650e056464003878a59d3ba2dbbd5b
Commitment
7693b7a2146b4931a4894491f60e9ccc6c98715ca8808b076bef4e4977f59639
Range Proof
672 bytes (Bulletproof)
Memo
135074ac2134c0e7a0d6dcb7948c789ade22300ae176cbd3fbf30f1e5148816eca984881abb0b09290f70208b38f0af06a910fe12ca5e9f1f5b6291b0f6f120dbacf55273b519a5ae9cb65f45ea99a84036db7ed560f84f696c3167bb84f45c76420c7f72b847479181b01db6ab0e3550d16757f8fc89ee8c78cb9dc456ff357 (encrypted)
Stealth Address
52faa22137bd2b67561f38aedc2dd10e8c8b7944f892d5d8c65e3f601887363f
Commitment
8030c124dff268c59794575eda05e7d992fca40c10cff22e62e503570714c05b
Range Proof
672 bytes (Bulletproof)
Memo
8527c409766ef8fe40f35344e20db414183ef1e4f9c35a99e60196906dc5a51c77d8898c1593c8ca890f3cdb52c2e5de9e0d82db96995f742aec795f81ffd744dd94126fbf321bb5a747ea7c4a9ad30af861dbd794e42dc98851a4654ce58b09fcc29d6bf248f29bcf49fb2855fd5feee977378f357be53e3e2ad2913ed6aa1e (encrypted)