# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
f6bf0354905148484cbc14ea64a21ccec05653e0d0b4b3aa6f59e7bc534d3423
Pseudo Output
ec067ada7cff44e780fc3004532521da648c607db957d2bcc0177e7b0dfcf745
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
1065d256378b2b9a24729b97160226e3910e2278b0cd98ff982a7a30d958f620
Commitment
989486b6a5bb6fc974b68c17a88b80386fccbdad13dac1bdc2e7b9214b08a22e
Range Proof
672 bytes (Bulletproof)
Memo
b422c87d6d879b5ba099ec744c28bed5f9ec74af92d499d86821daddde956368792163ee2c398e9f8d0adbefa524b9753c573b99da36515007f599df0442f737dd3f9a769503fdb03f7e823d11a589f4e1b644dca0b35b2f5e7492719a0daa0401399fa940eb4a8ce3f5f6f6de12ecda0d305f99fb8ca5843bc6d12e3077c355 (encrypted)
Stealth Address
42049e6ca3ef6d5a070ab52295198565b5b98a7c973629afa126379839a11c11
Commitment
74af9eb6eedcc41049450adccabfd792f6d5988485594a3c2d12f185e5d4d070
Range Proof
672 bytes (Bulletproof)
Memo
33d55060a94d3ef9653931118ee69b923884e8d81b771d07d9109d5ab6bbfd5bbcf8e0e578e179e6b31f8e1654c2ac07717d64651b0ccec63fa88b1197587d0f120adf8026c2458de91cd3875137d8c38d80b7536e1659026e80a10e5cdb9bd3e201d49b7db2dd88ecb075235d5e1ef3ff3db25667535f17720a62744816e07b (encrypted)
Stealth Address
b2478bfb5bcecdd9a0a32af67062e151dac0b91c09125ceb8f7b32c340dc3b69
Commitment
84dc0856100cdc13f133fd79a5b091903b7e63c63ca4a29f70bb7449af6ae20e
Range Proof
672 bytes (Bulletproof)
Memo
142ca4a5746d4716180eed0d97f47b863d6c5bf63c8310788d85c37ce99cc0c5310d91cb32e9edc255f56bc82dada38bc9c049fa7723931de87b80827e0de33fd435fb0be176bef0438ff7838bb3090f11135e73da9ba86183c30cb04f089b6b3c5e787f00f420a1d10942d2c9038a97147152f9c32566e9658d0203fe920e67 (encrypted)