# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
4420da5752e5c53b772fb22f7732c39d7530cb47486f0baa0df1fde28179ba43
Pseudo Output
06092cbeb7cf71298d32b348c553c9bb4bc2c684fbcb3923beebcaeeba2b0162
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
de53a8982302ee3d7c7d918136e6ad8c61d4bf2d495d43f0dd10160d964d7d25
Commitment
8a5d4f70fac993be5b4066fb4ec6d861c126509dd7b65a42220245d97c7b7d3a
Range Proof
672 bytes (Bulletproof)
Memo
456f655d5b462a1c7983a3086e5cd347ea8ba916a1da9bc120422aca45bd654f74a72eb46c053d1f7ccec5b77e277d74eae65942a77bd59c34305b7e2b474717c2c7685e009752d98bb590af9e621a9af32ebd8c5c88e6044b2de880a4e3f897b80f1d1e36371978a2df753d9a565bdb9bcb9e03d1da47774df051592e21d78e (encrypted)
Stealth Address
ac602047c7416098dfc00efa884f3cbfa5379580902a7689e8c27f562b171e42
Commitment
807be4a6099762ffe0366dfd12639ffd8c26dcbda6ce19bfff0502d90753ab23
Range Proof
672 bytes (Bulletproof)
Memo
f2eef2beee0473af68889ce0f14e9674edbbbfca2980621460627f51065e80c773089beb697d1162b475f46026ca874c6736f85671dfa13b14e6b58bf70e34c89abd517df30e405a525ed66cb57c8d294d6ee6f24256dac7fe96ca1136b52b75639637c1575819185f9f67839c7d6e010e2be0cf6d0aa6111f471cd78388f236 (encrypted)
Stealth Address
aed609fc6c56ec72994c4a95e73f2b750c34e63f6dac7bddaf61553aed99630b
Commitment
ba2ff6b01c7a3a1f92ff380aba8d9671a394ff5e63761296308cf6d24f86e32e
Range Proof
672 bytes (Bulletproof)
Memo
36b1230054e0e7e5002e55cd211e1254b43e651ce37108bb6632d8ed38cc0f2c909e50210c1b338001897c525789abe283db381ebe16bfa6690f84597dbee2b8254458949b731bfe5e7a65e38186f9ab58dcd59fcce39c3a75be893e5bc360007cce3fc60b2dbee8a08048dbcbdc6fadfd84dfa7f26fd1049d0e0ffbd12dbee2 (encrypted)