# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
98dc76b7c007ffd58049e610c7eeecdd7c3bddb7475d44a4300bffddf51c831b
Pseudo Output
469a8966739ef56ef958098fbe06061feebc78020a3f183dbed6c2d9c3e7542b
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
246a84595cc672f88447a47fdc8eaca3ee2ced39a736ec19c05c357118d1a63c
Commitment
686740b0d10a9a9b6fd2196cedd582a166d4e608cd27b6965bbb6ae23425ab08
Range Proof
672 bytes (Bulletproof)
Memo
c08c8606238fad92af17f0dac58c22e5c26a035476436bcd8940d90df7b852bda0a7a5d832dfccf8e3c7955a024075253633f8dfe814377a4e53764a4bb71a0e2caa3890330114205f4ef57ed9b10e858ce2f300cbecd20f623912034a2fcaee04691bfd4f05e1cae48b544aac5a58b512c9c75a7da5fb9738c39c2cbb646036 (encrypted)
Stealth Address
cc2c157fb6c3ae697720f5144f8d4a8dd9bd5f9d818827b77b42010569c39d3f
Commitment
56b7dc056f3d02e94162d3415ebb82101d036e7242df08eb86e436348b9ce437
Range Proof
672 bytes (Bulletproof)
Memo
c83787e12ac273220bbf3781d3606c59cf3d689b485cccf63f155134c6fae85477739bed5f1d4060ab610f32606fa709012712c54d58ce8a91e8cc7201982a0a2540e5530394626876d97bd426dc5abc4c6d7382bc93bda20edbcfbe09dff450d1c7a60f91ad3d6dbc7cd0765d53f5efed23894e5cab503e61fbc37f0a9416e4 (encrypted)
Stealth Address
96f61f086a5b08ffc2f49ce28666e7e3c449ec38c4c653588a1de4a32f88ac24
Commitment
b2591d2f57e3630872ef38622c99d2d0857d303261ac2d3eff138d6d58fa932a
Range Proof
672 bytes (Bulletproof)
Memo
05de903e619e1bbee930e234bc47f9c7163e64a12cdba216e4f8a1d59596183352c47ca30e565e830a5a102ec7d9a70f5c5d74bab60893dd8e3306e43b3abea5dc87d78277d41308a16ec9847d0f31457bac2f982108bf92b02e926750db22229af1cb3f35f98fa08c1cc8c06e1bebfa0f995a1b8115c883a593fbade9b91207 (encrypted)