# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
4ca9522f064b5ec946b3e4f092fac85b3a212d8a1ade61f0f38bcefc4b8eec6c
Pseudo Output
de9a767fc106155a2c0a7c5b27447e841e21f78a1cd4f6c46fbb362d4c830007
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
968f201fb1516098db99663219c5f83226c5a1240ff8fa8e78747fb11dfcac30
Commitment
babc861b69200ea3dc4a9c68e28a32808de6540aff1b9303fb8b812322b2df68
Range Proof
672 bytes (Bulletproof)
Memo
f1b94b2a633b3432952847848c09a3a6ec6f2fcbfd28651b14c67cb7748d69387ee17607eb817235d68a4a5b5250c10177ac06ab8c21e75461db4691d915b2b86e7491739c63f433137842e761ff0939e7f5b2de40e197393a5108cf0f666a50b255428026478af222e5e0b336585e5532688888bec88a992a22ff00db5efe43 (encrypted)
Stealth Address
d2d8fa883050fd318619737e1834c3ea357be544d5c9bb17dde0bd792665b21f
Commitment
e4cea129c2c1d7973c34e4569b8781c94f2c89c20072bc42de84f01d8a5b1b65
Range Proof
672 bytes (Bulletproof)
Memo
9e03717c4f4d36c7dfb9c20958f68ed27205d99e765eda876febd97877ec456e9ef9cbc1da2f95aa57b4021812261e2d6951bc2ca2ca2d5bb5b87aa97f047727a726c1be2580cc90b357b0e696ec22d743aeaa1f924138fe528f0803623d45b15043050f7dde414c8b40757d470ded65d913567cfbf5210f00b6d7153acac728 (encrypted)
Stealth Address
80e14b7459c5d0f9163782a043a7e5687b7966959c41f01a000a9487cb8e7b36
Commitment
cadcc495a75aaa4caf750fd37ebd175f4d9f74fb68f8d9ec271448901b52b85d
Range Proof
672 bytes (Bulletproof)
Memo
5228b8cd5e8ee566ac95bfda1180445fec7d4e08d1c22670c3db163c02fcd409538cbb4ab8a7f47a4d2348ba2a89185fec4215f7c109da9f1b2104b784b72c1501dc51a5a106cb4de0e3a46855100fa8b8554d54c37388d0b78ecc4066c70838d7fdc411260233acba480f369969889c6f20acae9cad00e7b963ed61352951ad (encrypted)