# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
54799763d1bf1bed030d4bb3a6d650470466296c301e1f2f9993ddf924e31509
Pseudo Output
34fd6cb20a82d1e521e0c8d465c900a60659fd728ac729964142c19ce5c3fe23
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
b0103331b9ef2efaa5860d1310102d6186a228a7a9f0c62c545efec153c01c24
Commitment
ccc5fd63c9697d50baaab1ac203e4b3eb38dbb524f31b32e9c73eecdc91b925a
Range Proof
672 bytes (Bulletproof)
Memo
6cc51db1c29f266b78b69bebfb9f5eec3d07393e20c0db3d4462dbfaffa931738c12df167020c9dd631582a04ad48ad782dc8b77096621f4c9e17f1b581aa583a333d369779964b4158891a49d8d2c1c5966b9342357a0741016f9fd05351371a4999487dcc975c7894b15d693b30101414d913e362a93ef0eb950be036aa525 (encrypted)
Stealth Address
6c4d2dcf50f13f5f75ee66b991f4b999745074efd8ee267d6a3947b5772c6323
Commitment
58c5ddf37eff79bf5ffdde8e899a226fbb87e67e419f05515fb69d2efdfba95f
Range Proof
672 bytes (Bulletproof)
Memo
a21403db974583b12f917732549931d8648d7333d1d34dc605cd531b6ec8326a299b9a6e2fc66e1d4532c08e0f3fc9fb8cd3538ce5de27d8b040010c4a2cd3b7fd0eea2e47a66f1eeffe41922b976da7a8f60009bd6be624e0ffde8d7ddfc838df9844fbaa4111f6a1b229a005d234215dadc65c81d5dc7c3de2d8e172bfe4ae (encrypted)
Stealth Address
3805c925fe2c02acf73080244d57e76131f4d3d496014492b8c18967b0296e2e
Commitment
8cfce6563bd16c55ebd85bdff7174f22972c6a1beb6c415c1a02206fc0f0295d
Range Proof
672 bytes (Bulletproof)
Memo
83af3657e1dba0e36ac474b6172a3b2bba4bea8f4e79b17c91da27d36147aa55c16b3d7651d78a7f7602c896ed7c2460a29c441b9a831c772220053e393b0c610623325e3a56b7904089bf660149241f1e473e247e0a4f41378d40339adbf384f8b84168f681eeebd7e3ede453791b66394003ebdc542ed5b202058576707fd8 (encrypted)