# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
3c971e87d7c9e3e9bb6bf997c40d99658141d76f02d3a759e5e4e2c8594bd46c
Pseudo Output
ce8d8a5369960e1e256ce05980bc5f97e9e8d8d258870cf9385999ec21a14c2c
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
04f6fa6d5048971c73a108e2bd01397162ca7c6b279e2ce37214741dabd46138
Commitment
746b93f6da1ee069de33d9b421ad6a25b551a4b6c55482d067c9e5ed40be0268
Range Proof
672 bytes (Bulletproof)
Memo
f37a66999e668d68085f8d8ac64a41dda0a91ee4d63e9bfffaf807600431d806097189e2518df751e1dd432b2a075dc8b3b34b4106e648a5d88529334fa1d56eddb3007d32da180912855be84130583c780a69966b52043b39ad569552751c220415b0881185fac5bd94c1cd4b0800ce01080ecba4dec80d790c6b659163e241 (encrypted)
Stealth Address
d65702995ca4395253790418ad987f75e81922351a5913d2213c287eb009a273
Commitment
2efbbbb483023f6076328ae5b3689897f032b82a533643d58dc609bf3b8a2e65
Range Proof
672 bytes (Bulletproof)
Memo
ce4b8a80aa68000c769c62e98f3edb65c7b086e1a3cc798eec1d8428189ff5a01f7566ab74cd980d2e8e4bb90d1fc3808be3aecd885a06d2ef73f87d8087448496ba7ffe1e95a257180a3fbc544a3993f6cec1f7417eded75412c65d82a7747afa46cc59895192de622977a974a8bdcc0ef2acbe735853fac3c107e23a3a6848 (encrypted)
Stealth Address
5ac90a16492db4046c7be41948e9b7ada67ecf52f930abe35ebd5b93c7e3223b
Commitment
86bca7219b86c5c1583c977f37d0d0dcd25bfcb039bdb0ac21414a01578d160b
Range Proof
672 bytes (Bulletproof)
Memo
65162e65286a98041734392048af4372d471821bb34a5c7ed3199797e0e8102f2aeb602b015a14c7848a99f4aa2b3691db49f055fec7cd25f740d02f50110b69b3bdc16fa69b15244aae765f4c41804ef925e16fbb934b90287880f1e5cf8f5e5cd9e368a0e95c517993dfbbc3738b908514b50226cda48f4b70a5281dae28f4 (encrypted)