# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
6894350e066cef813ce5efabc6f0bbecb701baf608abae0b5fcb750533510d08
Pseudo Output
b48f9088ec07bfb00ef9cf655c5b0ef043ca4a61b98535d08186696d2ddcdc4b
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
be40d4798ce76720ede0332096a2f27d0cc2271e857a38e8cb857983fc5f2370
Commitment
a2a59c2f185955df3655279fc9790e11acbebc4327f0883dd2211a19ce209332
Range Proof
672 bytes (Bulletproof)
Memo
80e34597628e427e6bf3319f65a7344fddaa4a6edc0e63ee1241d515e2cd90c790dc0d1c4977b77af706432a4b830a769299d09226c4cb90a0a3ac2a08f945ab601184667b0d69854e8a9d6b4391c868040c9b5c3471dc43b8be00bb515ca09a0ad914acc9bae19eca0362acabd65338f94a1cba1d7e13393ad24c9f82dca01c (encrypted)
Stealth Address
b69cf6d750aa7277c4ad1c052a8656063342a4580af3a5edc9a5e5285fa21e78
Commitment
5ae285f831a14f8c969d8d6a0ee741ce43f8fab685e35fda2c5d9922de5f9108
Range Proof
672 bytes (Bulletproof)
Memo
c1dfd19c9dacc6d59e9f4c57b197eb0d89da5ac40294d732c408cbaed9ae51b8083e2ed8d2d65ec7e3211eea6d4f7b5613701e3deec1647e413479421525fed5468feb8dd86d400e66b55f042bab1d8a27394513d7a0267fdf016df42bc735bff74bf61c56b5666f521e2681e7613ca733fa60276eca913dd197de8ff4a34e4f (encrypted)
Stealth Address
98d4bbc4e7ceb5462347b8521e8ae04ccc4aac8866e217c7a395c31c056d6075
Commitment
96a8e1b242725827e42f3ffa75b4fd30b0940d92dfd4858837bc581155b2e536
Range Proof
672 bytes (Bulletproof)
Memo
84ecd13c1d6011f9cf7a716ad9db7e786dd3245b7195ec7c55a7dbdbee87699b0e8842528367df81cf8bedffa53d946de884b0499c63c947eb08aa7565d44d7de78ccae71ed2583d1a7c88fcab2296a2f368c1346647a060491e4952bf32ffbd8ea33b6f53d9d7c53043459bdf1a0a5c74f1cafdbd01acacafbf3241044777dc (encrypted)