# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
48f0030b4b95c1e90f16a5e7034729fc41a3b08583b0302e774aa7be54087a0e
Pseudo Output
6040cc7927a14dd98ba64da1f92993fc64ade58fe1aa706aece089d77dc3361c
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
d47696aed84f6695ff0075e1bea48bd8d022e17fc71b50b9a5aff4cc2c611979
Commitment
841338577748af57d268e2c2b110afdebbc8d32a65f9a66d951b4f17d2b7612c
Range Proof
672 bytes (Bulletproof)
Memo
70ab61bb186af6cd7210ab2f89276f3a209db4f7109a13428b771ebea06790aaa8cdfce8d31b5c9004738b8ae7c4129b44950a5fcb3d98c8fcb5f676e655d369f4f9961f6e4e2bcfccf3ad3cd90c06637724c1e47c0fb40159d9b96cf4ec58cc91b2eee994d50abcb581159d08cba2988b98b1a2188c439b01c6309604791409 (encrypted)
Stealth Address
3e31c396ce3be644329e6001469e4594542e0da91ebce1a98f0d997243c2e810
Commitment
38d61203fa60d24124976a393118fb9bfedc5f91dc4b84c38bef6ad4964e6228
Range Proof
672 bytes (Bulletproof)
Memo
fea5017a3aebc0ee6b674e26c80e4232be21c8df17f9676c90bcc7528e598ed0d8319888896de27ab19bfa90047ab01d1d8450fe27d524fb278a2a69eb1684921979ac73f955bd01cb0414ae5acf07fc87247f95097c7a949e0f99e9432873d36686dc7613610713ea81b72cafeb69431a61572233b425abb797a2e00dd5146e (encrypted)
Stealth Address
989de50b86f177f9534904fdd5019bfa437718c44c43344611038900e219ab58
Commitment
dc049002b97eab3d56845d6a8a1d3079e2f647b1aa5537a0a608d09e7001e654
Range Proof
672 bytes (Bulletproof)
Memo
82d3c96495a3226253a56b2af1c8bcca7ab6bf0ace4358a6f459325fc6a395118a26ede8a0ce499d1648d27e623559680c9dd67f8ecbea58811363dfd6319663e1f47cceaad56f33e0b2b34e8ac938cfc0bf9c68d76c72da5b0028249028c239c0cd263368a1fa8be1a4a854f042dfd9a725f0fc298db3b534c1fde6fbee2f2a (encrypted)