# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
60196bd136a45375001c2d6e91be1da7bb2d2ba76446d5194ad801229855e47b
Pseudo Output
04fb14997fc44848b5e3bafddce3d76d331ed3a84327b6d9abd5ad1c4dd7e409
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
a4e676bf9ca82c696a18637f7000e8378085415b7a035aa00d68891629812220
Commitment
041b8b1a82c89103779b6cca08663dce93dbf413007239e670fe8580a2640f76
Range Proof
672 bytes (Bulletproof)
Memo
fcccb211e94b40daa98a344bdbd484397b2b7b8f3b3a78166f34d441c13af5807e806386c78cdc711982dd9c195222721d7d52aa456ebf6cde0ac3038df7844b67d27a6daf683a89bcd1d8b18235b26f5a1ff7b859fc15fa700af622cd18214f79c1788ce120d65955b21e7f6fd1638ad729451cfaedca1e23c25bf372b26463 (encrypted)
Stealth Address
b4e33973505dfa906673a1588bbdaf081aac995174caa997f62da1f7bab6fb01
Commitment
28e11ce6db30071fc02435c1d65f20f894318c540a586840c57cf44fb514352b
Range Proof
672 bytes (Bulletproof)
Memo
32483f9413a8b24fabc817bfb1e8422b59ce7798153d628742efc1eba6331acc16879f9ed86ecf73f0dff878b738af74c75cb68da2026aca748aec8a86655f0795c8bcac6cb7e2aa2a3dd604c2ac896ea64db250961d79651f6eb7cca8df875470afb7da8eadd78987fc912c6a1fabaed694c5596c251b6a57f03986aad7732e (encrypted)
Stealth Address
f66f060119f29cbec5c3e5ce22537e059a6689183ff0e639a6c96dae898c291b
Commitment
26e40b9d3a2e73a541e9c2950350c04584368fee482ee61a9bc5be28d108850f
Range Proof
672 bytes (Bulletproof)
Memo
bb7199df91a8f2ed049f2b33892a18a98b8fc6450c76a0feac98272e8941a3ed7bb64e6414ab4fc35def43be6a48c552e4392d49f3dee92f070caf2e0b646d94f04d5b69a825cfd3a468feb4d8d0e7461aba6387bc3b1e1964ba5fbaf7db2b9c2f3129f7c11fe2f81aa6f806995512a74bc95cf432de4c9558ba3f9adc05e817 (encrypted)