# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
92835d45bbd125120e6213a0cd9b0ef3ec09ba85c1f2894255d56ff4ee102e56
Pseudo Output
faa901d648e3ad49a45d6d57956c1496fc621aaf94c9f5d0ad12a54a72658f00
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
4c3c360f0aca69105d448ba8e98921eb488f561c31a9b27202757822fe50be3e
Commitment
52e6115a270a0d6870f6ace340517b44f4030e5172d01d7a27e7822e39a08d60
Range Proof
672 bytes (Bulletproof)
Memo
854d8463fb983e0397d457bbcf9806336ed2d4bc6dc660ddb238b108f250af7f89198366184b3f2090add314eb4ca446a15d22bcd9cdec7c2b8476f2952e768083abcb6fdc8866d09c4c3330ca4a0b6387c5661a9f6dccf8d1469102e0f0502f29e258d0b48922f3009c631470ae241a83b2052a7608c013413b146c6916677a (encrypted)
Stealth Address
12bb79152c13c32b523f885714860816c9f6a994a8ad99a1d53a52c8ce951718
Commitment
ac1344e91622882a113b8afd30963925e57c8460410d717ca4de7bbf50af3003
Range Proof
672 bytes (Bulletproof)
Memo
f80bba804e56c8bd69e224e4d7bca021d99e71fe086b51fac0ad918fd750e27bb592ed60a73c7d90bb8623cfdc6fd5be64e6ad011b15ee53efbd6b5854cc4225b7dc7d6e54cf3d4a8443cd1309a2970aa9f936cd368a0ec3b2ffbcb201023145450e1511135958c8d16ded82fab13c9e4473c96e8b090ea15e7872bc031eb53f (encrypted)
Stealth Address
fc94433ad8805714f9b6e6ea174a648f8afbe501436d05466ffcb40f9653c41a
Commitment
12def04cee698ed4c9eed64c2d75b5af2470931202c1d59e274fc4942d0c1f33
Range Proof
672 bytes (Bulletproof)
Memo
ed969dff0a7b3d0ed442e9693828c7bb99e6cd662acd1e0e70212a88d480a1f7f9b5f8a31a6f1ac848c7044c2d307cf70aae50cd53d44fd7555064946cd673f2b5d6a31766f64e87d2b343211be193690343f16099154c4dd882af7f75d3fce969062bbf64d41b0b5822cf6058750a3228d51115d0ba4ba35e1aa7796fb39e6d (encrypted)