# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
3ee56ea8bd28bb5edb590938374aa0897114c4bc245d0f6c1aad5bf59cd8c71d
Pseudo Output
be93ba9b37183a3ccb0017b96bc52e9de33881246275474390e6a3b742704a22
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
96b53dd9a28fcda8b466a12b1cbedaf3c0e16da207e1fcb9d016e7961b3e774e
Commitment
6837e23aa53b31b99aa737762375cc2877d2839b9de9c067f4c6130c49ebd839
Range Proof
672 bytes (Bulletproof)
Memo
d578abf646c2785a42e0131f0179b1c9c01dffd35be214759b9301c7901d4f1692a86c1c01f536218bef245ac3ea8dd0eb804fe7ef52e4f781dc737f3c74ec5f6f9aca754e49e1118612449955024cdb6773b050ed3bee6f3ed5d40c35d98aa346b97c06296de238ed0d5f054119f951700a98033696c01690035c40f3dffd07 (encrypted)
Stealth Address
14527a9647e3ab3070715289d6415b48b30df400ef62866b3d71a515e15c9d42
Commitment
94be35da2af30999de0befd5eb6c5b2d7cfa3dc7ede37807560a1c018c132f47
Range Proof
672 bytes (Bulletproof)
Memo
30cf0d305285d53e6e1cf039c589e0d742f03a2d39ea2133f221234a6d6703ca5368ac99bc87761722e3e909215fe25330c1536f93ff6034fe717e59aa56c81a0814654c0d84ca44eb846f3f4cff00022b9c86f3a05215085d3d8af803ff3a9f98d6aa8e06ac88ae51c731c2f3900cbc37e3b499e44ef0ade2ad6275bb3d4db1 (encrypted)
Stealth Address
6ae6d9f14d0926585c5fb8edaff653dd0d551c2b8295eac240a127d9e0517605
Commitment
c0b33448e88dac12762f40b5da943f2dacd26192aa53e241c3a3edb8cc102b09
Range Proof
672 bytes (Bulletproof)
Memo
d2f4628f83d30a256017ffa092a4c5f2f1d323d7ff96050203a4bc424c1675059c3ed07af26a76b78bb8237dd145d4aa76fc954213763c754d5954b1224c9de235149de73d8e725663c3547cdb16ebda6c2abd3782f00f7a09eb971370570530293cae229179fc1c8e1e7bc7cd3924d17f93084299d96484e4807141e51f1692 (encrypted)