# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
faf4d0c60d0020dadc2f07784c166656a4671cc59f6b31200cbc1ec265bddc52
Pseudo Output
68469fee2641db29a6d1c3bc6fbda02f1f7313ca7e518e1389b9615fff086a0c
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
765002e5a93a829969f5dc2a91115f8a43446f8a2368b43404a76fc52a589839
Commitment
6252152bb5ed515a6d5b31a56bad7ea12a957ad6f6acd1033a6579382018ae10
Range Proof
672 bytes (Bulletproof)
Memo
56565e1bdf9e144beef7039e961531d3dccfb9bc2813edab9d19f32ab7ff460c9d773b21a97cd95425d61ca289c4d60569c409bfbf93963b9b387dac99f4a3862db7a99f9236d68fc961789ba6cdbd3512eb130bdd00e30b795d94aaf644b82d381da9d7df49a951f13ecf318c805f16d7beda2d155dab98e8150a50428106b5 (encrypted)
Stealth Address
6a4e9fa65674f4fbe10345bf44b9ba56732d553406c7baa8a542814aaee5d901
Commitment
5462805d224c9b7f575429636fe49b8ab99411f13cd1ab041f81bac484356c5f
Range Proof
672 bytes (Bulletproof)
Memo
8baa2bfa771cb4440c97f73a287038a78dfc9f4e835fbb193595056f3c64c55075811c29cb06cbba195c2f488f27feabb72e9d13d0725af66c0b399b6731805b4727de4286b3209deef265fda903a7f6fc2cf1fb76be187b6493c3e275724bcaf206586da001283b0ac69cf161ac8acff1fb47b5f908df36ef6bc5fe3fea980a (encrypted)
Stealth Address
3c8b846b0410364f4958601ce4a57437e071b8362fe652ee9efd5f42e3a1533c
Commitment
5c4cfcdedaa4d8042e2607d3024ab98c7b1a1f2dfff5381896be992f8992c923
Range Proof
672 bytes (Bulletproof)
Memo
9a6e5a1d7cac5e848cdf464765329d6eee54665d2a586c3d01eb0366979dac0365659a8152c341b4eed0c6ee039b93b07a5fa80b03fea851cf29cb92f04f14afdbcebe2d9531187c27e0f28703e7a70d7f55eeed4b830b6794e0478f9e85e20606d757e2b09db03cdf8661ae9b65a04ec5a4356c2a11ad1eab6ce5ab973b87e7 (encrypted)