# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
d82875c7fded58a86ccb088b6ef69604f40bb2c7ba55ed804308db9229d1be1d
Pseudo Output
f0f142e91ed523f5427b2395475419d3eacdc91f4e151e0b3f77559c98455633
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
a6f89babb22d5354fb14072a6980114b9f5f1f90e523d37203a991f48b37bc31
Commitment
6623c1712209a0d0978107c7aee3704623dfab7770b63a47a34a8c1ed871833c
Range Proof
672 bytes (Bulletproof)
Memo
b3f826621f82ec22d0f7244b1e0649ef256151f2bbbc9c9b278333cc6b1b3db64cc13cf911b8f1f28dfeeb56cfd366781f7978a7761a7a52a47f730eee5c5dc8cc40671ad6c0e0f06823d0a89763e560b914058c2b4d6feddbed8dafda845f0513421b14391b5eb862df729a5c71ffa81f8fb3a1b0ce85814dfbff4788c6a444 (encrypted)
Stealth Address
5c545ded939125843204452a083961e7e1fef0caf1dfa4a54ee035d27502a163
Commitment
4cbd1439981160296ab9fde05159998adf7c31dfbfa60605b2e9a0f0a10d8e68
Range Proof
672 bytes (Bulletproof)
Memo
a304c1dd7fe9ae0901fa1075fae2d7b0fd1c6bc638daa536b8b33e21f9728a788ea734b16cec17f8994b9b410c7bbe6f1d37f44c048f292002117fb70f3aa7c0932f3f6e4852a7b0cfac16ce5041c96fa9a09a7e972c4d4888b46fbfc4086c5a38f6d968e55fcb75c98838114646552c6ad71800ff2bfea5d5e0c041316c5d68 (encrypted)
Stealth Address
2a508341122c2a5f3bda3045d792a35ed8a8d9aa855008812ba12e35d8e2de27
Commitment
ea239ad05ee641adef5be772905531f432d39125fdee79e93a363d52091cc002
Range Proof
672 bytes (Bulletproof)
Memo
82959ef95b97138e1fdd70cf9d3d6cfb3a7faf1cd8adde383b6e1d83685ac09c56cf285bf52e7f97f43cede3fb573a1b0e20714d7e8b667ee45a47d6652f44c1a2b3a49e561011579bfc34d88c19a2a3cc232b9202c1b3f31a4a1876f83eaabeec7371cf2c22e3584696fc013eea786383e85af364861139f4dcd379ed30e6d2 (encrypted)