# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
d64931e37bfe6935642166dbb49e12e34c3649ec210c057174122e0b466b3c5e
Pseudo Output
2816e63810411eca05b2f0680f66d5147490acab32d24ed0d0007a6082d9eb33
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
bc901e1f2d98318cdc9c799a96128b956c6d6a8dbfd2c31ed74811889539a40f
Commitment
a2ec8ddeefbeec9eac48614f36b9e56f53a58de831387c0dea0561de661b992c
Range Proof
672 bytes (Bulletproof)
Memo
a58c150220269e038fe5f440bdd5edd08a0cf2bcc9204e0845b251f9133655a4b5f71296845344495284e8e043caaf5af529abf1f9d8d65190da97c3e33ec5c5c97e7acf613454099c307ec5617e8c9b7d1ed2e366133422c48854ac738686e09a2bdadbcf51c1484144c37efcc4b9e3f15242392b23c23b1aeb00757256a52d (encrypted)
Stealth Address
3419905beb72b6a0644421c9969ff1c359db17de533ab4ebf98075d50be1970b
Commitment
3427f30746f47c3bf76cf3b1ebeac12cc5b342bfa9bcf909a60313693716a375
Range Proof
672 bytes (Bulletproof)
Memo
aa99560fd97b1746462f3a2de3594195867449bae4b553d633eb8370d80647811c6612e6532d2e275316431a4480637ed09ceb6607526cd60d8d7e71adc7896fe059d3fd2ebcbd1e5e88093ee5a28a79807c0bb30284bc29513e398ec789955a3ea5026589b77913cc38ad3b6f2ad898045e2e88c33bc6e7285085e6e6264f85 (encrypted)
Stealth Address
e43869ee4995606eceeabf6f8458c7987bf45b7de1293d3a749f7c74c625234f
Commitment
da1639b2a02198d84a9f7a1845c97ae7be34ddcbe59ada950e8c633b117b6278
Range Proof
672 bytes (Bulletproof)
Memo
2c9d712f60061d248576adcd0fe014730534738d5824360f456c02294bac386b07ee960ac8a1ad5f2267088b0eef14611b8b528f76b2237172efe917b07720a231b9724d0ca20e421eb7f7ad84be667b82158b55377f6acfe6603016b304d23eaeb6c0fb00e908e058fd34bf650b415add62b73f6ec4d34c2a910a0cab571fad (encrypted)