# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
a60cb91b253a06f36a1afe22b2f8f67b4900d7e79992d867583437a12f0bd00c
Pseudo Output
90182596badd06fa816f2a2ff58094014069b91b39d70f9fd0254c1328a6de01
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
4e791c2709912a421bd72938cd33afb632c8e59511763e8069d3454fcf22827b
Commitment
6403300bd82dea00793332980135903e20747f3f918424e1dee75bbf07f1514c
Range Proof
672 bytes (Bulletproof)
Memo
b56f756ae3aa1c128475e656080b1ce7d6c756db7ab43afb9d9d2f21bdea5759babd9514810dc96283405271e40cb64c265c102706f8eaaa37355febf44df67c20341787648c8964ad9ec1d7671100c57a83f2a7da9bc6cfce32cd5160798a9990da42bbb0521ab6aa0d18ffdf74fd4e0020a45ff7e449b3566fce4f20f4f73f (encrypted)
Stealth Address
0c2c1a21e0820d73e5b010fa1758ffd353ac8713ed2f23c6f9a57fda1cb49432
Commitment
b8db42b06b1ccc8936a72b3c553a54a435955ee5e11bf9e8aaa6cfdc95d75810
Range Proof
672 bytes (Bulletproof)
Memo
d47d176301442ae30514eea255db4b28dafc5fe4d7c7cba7457ff77936a268ee90820537b0d0eb5c7f3d32b49433fc19c47d0a9fbfa9ef44a87a825d4d42bf6c05b4668e6ae0f508b407e7b7cc2ac5dc39a5a2513a49f16359cfdd04d7affc559a271b1571c80454474cf82a3dee79293a5e39f7f9534b90ed97182d63384115 (encrypted)
Stealth Address
283d1863c3ce929549a5e513eeaa1023d1545121d9e0f256a7ce9d4db818222f
Commitment
32869b135c916d96e2f525ac4fbdb9d84dbf6e09a233d8a9a1080c7c36d4e50d
Range Proof
672 bytes (Bulletproof)
Memo
867a64775d5ffe36bacc88283b868aa60d94c629a88ede965af593c3847d5e700eee97e1c52afc5b3d8be765b26afb65000759f26cfac2e03f29428327911b1e4a87fd2bc86f31ace9b34e2ce807e731f7b4a09d1672d0ae58cee94e72df4a2be6b4eea09525ec0a93012b9d8440385601dac7f65c60b27110eecc111409f1ef (encrypted)