# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
44e6f820a4f1a2c4389bb70d290f1ff5d82439c57299bfe7c2f3d896c545286f
Pseudo Output
3232c1905f9d044be13b9441a8396fad838cf77d67ed2863b59cf8e39eac1531
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
accc6f494231951c8b4ebad08a3f6bece073781c4ee09a600674540250edf368
Commitment
fc1c9e84456f6f5a6910c83c154a0cba9741e070a73be443755bee9a0c225a7d
Range Proof
672 bytes (Bulletproof)
Memo
9df116f812eebccd9761b65c5c844a55756b0fa677f629c3878ccad00ff990268c71b16926c7effb8867a2b8e85eb34a4cee1c4c0064fe7bb5892365159c766881efac331153150b7b73991741d4d5d01fc6e25047313479ab6f4f1d788afb4c86d3b93157e12fa98caf6539b3a646d994b464fae96ea43780b26ce45c92bfb1 (encrypted)
Stealth Address
281b5ca8372cba42046bb545d9d9d5b92874b21f4ae884659772cc32dfac2c74
Commitment
6a964594d1cae7dffc1efdfad92cf72a556c8cd19b619a4f4afd9d3208e19646
Range Proof
672 bytes (Bulletproof)
Memo
fa0b800c23bafa8bfcd66bf43fa5ebfb13a126c245c08f2aea2beceaf3f1b14c39d210daaee4450356b71e8e1f67fb30bee0ad9285f582ca39f053b47088a7fbbacf7a0e1fccf318ba71eaccb07bbeba8820caf6e08dac8fc9c1a72129aafcef80a4a1d9457f5f26f38a4eb3db3d51c47a81e5cb6074f6055006a190360fe862 (encrypted)
Stealth Address
e0a264c2195f6633ff615dc6b56ba84c6ca5571e92db9f7c398fa8ff6ce34514
Commitment
000295f6862ee462423b741b9dfecb3787b21cd77d2a0b63497b08d93bf0f276
Range Proof
672 bytes (Bulletproof)
Memo
4dfaad1a5a657774a2e8883c9df3eec5331e2ae62d450d621ca4cc143abc911a2d4a1d64998ada217a4c8dfd2be7832d42df6d678d2f4858ec3ffc132256da7b5797d9a1e4d7357eee89108264372b4c52e267aacb7362988238950ee6b7942b006a3f5b34e755519b90d8bffb68727cf144f1d587016a08f4da28fc1d55ef9b (encrypted)