# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
1006dca62d9635c31ef778271c5924ef31dd2b6467f4cfaa1e6c7d9f25eb4d51
Pseudo Output
067bf215ca2fe6ae9937a75e2954f4fbb3fb8aa8676929d1bfca21847447d80d
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
d22801b777f3782eae4a3f7957c0c94f6dba51abc5a2fcc4b9d0298aac99a451
Commitment
3ad3529402d2d71f5bf2d29ca6d7d840aa32ae45c04f67d662a8892065a38d69
Range Proof
672 bytes (Bulletproof)
Memo
d7cb674b0e035d6eaa3d1ec27bd4e67ada304bf155a2b154abba24144b67687573caee8f8a632dab786312725427dcfe973bbbae459b6a373e0da6d01ca62e2c3a73019d862a1f043fb26b5d5f6b3df6fd23492949c0e5433232006b96ccb61196b09e1683a633cedadeaefb62bcd16c56376fbf1efa46113ee9027c574d634b (encrypted)
Stealth Address
96a66938c5f1e9ce19cac44ae6e5cd862f754ecfab686d561b7edaf15415c551
Commitment
166e529243ae083bdf2bf1c952404dcdc36ea1f1dd14efcc03dd7ee21165106b
Range Proof
672 bytes (Bulletproof)
Memo
338667286db28c1c6902749681f06c356a5659e9149afad7776a845a81fd1c7e3d310b3e4983985cbd5e3d079d409ddd50c38d1414f4cdce7a7c4fa97cd1dd5acaea6e6c4aba1f8f60bdbcd69295cb9fedaba4323d183c2f8f5a66bd857b14d751aa20edb2eb34aead2c09a33944a57fc7472a8ccbf0610319d4f8d976d43921 (encrypted)
Stealth Address
c48abd2e707d1df1bcb1e0423c19000bc1b296d977bf25e776587f9b8363b278
Commitment
c4cf7e5b35e5bfa14b2ec0d48283b42edd32a2c7edccf83cb54e26f948d87c24
Range Proof
672 bytes (Bulletproof)
Memo
77adbc86928da442b939c961d36c7dd19b1f2ee8924f4c73f1fef000fe397a92fe610a1e08519d22b53a84c6531587bd5be0865fd5b733f1f573a99aac1403399c16fbf8d2955e2fad1c1a858e7bdc266ea393a833714634b854fa595d24f0e27bde3ab0dac595d2f021f38671bbc44b0b13dae06b0860d2936bd345475f2fe1 (encrypted)