# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
16fd96f9e9a1a0f4a07d7959ac84d43c534e509e18de131945392d12e7b3b850
Pseudo Output
d4e3487f1c0166c45405323cbccdad9590c91fb912d4fbf89d2b5b6cfaa6614d
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
82f54731c81495cd3f144d9c41973df7e518b8c21c7f6776b10f5e20ab40f722
Commitment
f67ce4b5d5a006fc71ec648836bb9258c76eb429a9638d3fef3cf74a0dc81567
Range Proof
672 bytes (Bulletproof)
Memo
192ba8a34d1099707b69a2370219f8625a6ea6c7d30977d7923c010c22e0b72dd76b9277a4b873a2b5650916e19c51ceceec7f35e15efd5e39da87e442ca0dd05ea70fa62777584b390ae02513a80282ed88c4a2ad51f993dcfa858c11201db96a435cde14a9b7b55d07a4dfecd35bd820f505c76e2dee8ef45e9f6b49d02941 (encrypted)
Stealth Address
06d615c37ebf9de263190f092f64ce494091660fee8124809288dc7bdafdf130
Commitment
a29a1300ff02f70b616aaecb4ed87b2a6293a2de88db39b6bb003705fe7d4505
Range Proof
672 bytes (Bulletproof)
Memo
4cb2111f5db031d1840d2a2addd73790190010ed12f1e0444fc814d0292ecd7aebc36a3038f6e9f0151d2b0c12656f10560e517cfc7e2f752c1591c13f407de63e3c2fa65c589f0631ec85fcb6f3f97a18f6d9b038dd933c27419e4201a753a9eebec2b0cfc848cee2ff5ee18619e0612e46f6bfa836868989394f3f0d46c658 (encrypted)
Stealth Address
80a71dfc55e138409d0e2c0dd0fc4c10a2d6acb27b7fa006f5279024aa79ad31
Commitment
6ce0e59f09e849fbb758954a7fb99e216af7a17826717f32df0d64a3e5579874
Range Proof
672 bytes (Bulletproof)
Memo
8f3ea309771cd78e1da078c29dcd2805581ebfab25507d7506fce2129e5ade630c65021e09c2cfa9c9622a218f19612c7b4ada467622fb179930fcf9302294efab90c5b008ddd3614c65dca1bef3ce686de4167ab2ef80b3d429a8df886ffb5d6d68bdfd164c52e8d5237b0d9430d2de79122d25ff2379d7dd0a46b024e6cd83 (encrypted)