# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
34a46375c573f2bbca91a39a0b124d2b480ee2cfdc333b5e4c32ae095d6f4108
Pseudo Output
76ca9ab12dcbfd3154e319eb6af31436fc6facd032db570f573713a089abc516
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
345f86a5078327f698739ee7c96926c583f3a2e223214c16b43754cc914cc346
Commitment
5e854c52cc6a3f6c797d06491a65881a6d1250cb8a0a54c2c44de88d7e903610
Range Proof
672 bytes (Bulletproof)
Memo
4f97c7fb751b6f5175e9a999e921d9c14f6d807b6bfb6f176d5c1df48d5ded155239764605556d46cb23436bc4e012a763bcfb42ccfc50d9df1a6897023c0888fc45646aa59321aa79364d45ea2756554d59f69a76315979a812ffe9a2c0ed96b662f8c9a13566145d25487d8de5f85f0da3227342977c7d4eacd528e1686bb5 (encrypted)
Stealth Address
d060b1b0fc6094f65820fa53bc9ff3e1424492cd08da55349f202e470ba3b06e
Commitment
d025668a383757f6242b46169fe0e69e1f414047cd1ed28c5ec12045c061a21d
Range Proof
672 bytes (Bulletproof)
Memo
587e0459d9b34aa17c020cd652f48f1d724c7fb0dd5383e929444e8f53619628280d0264b326046503a9c7f704fe590752a9b5ae26984c4d46bb490ffff6f1ca722f993623b8e976b69baf130b5d20fffdb56fdefb7bb607cc1c43cda63eb5105afbc81990441ec05019931e5a3bd05e4a6474c3bf0f1d04060983788d1c7421 (encrypted)
Stealth Address
6e7599fd5b697ca223add3c10f6f687d7f60d8f32b30af272e8cd51691485906
Commitment
00cdf9588b25f388811c08541a131036acd77c4e7d34e2fc7cd03c0ea11d6b5f
Range Proof
672 bytes (Bulletproof)
Memo
40b3f09ebd46d060ab28cecf40e43bde27219eb73b30e833c9e0ca75c82a3728417602b0c7387164eef5a3b896a2f6d11b4936e3d97399e33de2ac310a249d92ac9f7b0146a107a3cd45905584ed2e3306400651edbbb425e8874acf0fdb73ce3867f0249cecef48e48f591e99d2d92c4001587c0d48f4f860f20a7a9d108fd7 (encrypted)