# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
f46bb64f2ce114c430310505eaf76a8dc8bf7362715434c5e6dc72189c01fa77
Pseudo Output
fa6d7e215b4204029ffe10632f75445a59dd249c2e0ad91180d051a6d7f5bb0b
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
12189f585f6ebe506a60b5dac45b7c97794aed4937a9c8598fb4e16353592e3d
Commitment
7ac53c603ee5f479c102741da427f3481c8fcc6ca40a5cd549051238eccbd33c
Range Proof
672 bytes (Bulletproof)
Memo
ab2220cbd819401b50003825fb8338548e46ec3d41cef747564aaa33ed921e682c0bf0a59cc402225ec5e4eae93d59217b87689f49bf11c642c90e20bef3c54996a29814f2e86a82597de18e87984b94294f5f003184898f2cc427b96d488697acb24443b729b4dd5cfec96eee7ecf96928e35f508175c03dabe51dce6a6ffcb (encrypted)
Stealth Address
d0fb927a8f13a6b06cd4d1f6c62868aa1e4e71448818e394832dd74f30676169
Commitment
202c20ebcddf9b8cc0c84b11810faca7a837ec3c462c926565d092ccbef3c250
Range Proof
672 bytes (Bulletproof)
Memo
6da0e0a3685c69247c4ae463c8e78c92916ae3d08cede333892688b3f90de3d59864c31af267839e930ad45da3b4b8eace62f3b1f11cdda549046e439c19d2acb8f375ad7ae00c9fdaaa0f20470b4c2aab52ed02f8432e61d037a257e0652054c7160dbc70e03935d2653d2fadfa6ce480003bcab98d1067477ac3521a9661cb (encrypted)
Stealth Address
d64d87b6f4d60b97069f028e9cfb5eda392ddea1d71963ed11b18a0a52009b7b
Commitment
70ce311a33ae924fb83e2ddebf7100b8ab0762916bc38e14a096b6087b807e75
Range Proof
672 bytes (Bulletproof)
Memo
6f4f4823bcd29d5d2944be814c7422235eb28499002eb22eb6e458208bc97df0afda0f994eb911e6d0c5dde164ca4ed2e952ca06ac3e2c6be2a5f779285376c2119044eb75d203f94cf0e71214aff8ef255a1d5185aa53562d53429e16ad3b28634bb5fd5f9ff59f3a7b16ac093579fe44e77ccb803550dcd478dcb28692a4af (encrypted)