# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
6609316a627743421844c2f73cbdf322576938a6a1e04f0f717237979a74051b
Pseudo Output
e08c495694c9ea5bc66d4e5ea4025f4757c21c363fd17766f60554ae91e39a24
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
faf5ec032c5854b374e9078919805cc4a5466bd089eaecf28af2f96658c7e539
Commitment
e893ffb541551bccc104fe9ec6a9230b3186e0b38305e0ba67a5bf20b40a7318
Range Proof
672 bytes (Bulletproof)
Memo
46d82f77d86600dc5ed03e2e021a08d08d95c2be71bae9421191488db67408633301acdde8953b10751b957e01437b83f5e9a72dff66824f13c08e854f784cf280cede997995d962db6b2d0eedb5e45a8a4baeb85928c2d694d7624d9190a38a76c76f52263cfed00ecdfd6dcfa0c59efb007e70054e1e0660b901c3b40efc8a (encrypted)
Stealth Address
4235d9bd9979a8b5bcdf29e790df3c983d41b292f21c18f40e4c142a2300686b
Commitment
06f96e9272801b60bfd0b0bd4f39af24d8ec39b96c5c7aa8b2c34f821f56ca17
Range Proof
672 bytes (Bulletproof)
Memo
0b7b181d836c5bfd251aa044d4fd4b07fa141e78bafe7822b99178bc24ec51fa0f87609c25f3fc3d4c4da351826595d9bd25633284f22a1c549e3cd312947d5a9f78b4cdf83892d209d82e7b6fa7d935392cf4869e489aab8564246e5707d4f03dfc201b2f0a2413279d947f83b5d62b9c9236e8a3e0bc526e4bc1e770886775 (encrypted)
Stealth Address
02969e4391403fdf7f661029d7be56250afd96dffe3683b70a9353dcd0fed91e
Commitment
0ac429e9859c190b78efb175268b9b2c0b70ed30f1f3dc328bc178e629c37f11
Range Proof
672 bytes (Bulletproof)
Memo
289355f3f35e5c595fb951e06c2c917c78d7dfcead059b7ccbd86ef2010b02dbccc585c2a1299e7b0dad070cae155b7d28af3355efe68bfda238b969b09647dfe4817ebbf03d24ef618eaadc1787d33d72b26996c164fa563e5d233854f6b64e8be5b557d8d93c5178e6e15f23971636fd4d798cdbcb53dde04ef27e0d9ef9c5 (encrypted)