# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
806babc9d469a45611035eb4b1062ddfcbad0b9897b32a500610ab351369b246
Pseudo Output
debc73cbd5ad3dc249c79bd061dd444c54f53479267f6acf26618b1631dbf907
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
72a2e4b74be2dd4a48bb0809a37fda08853094ca9ebf49e68a43f023bfd4d72a
Commitment
26a7095e572c081454376d5e615ade55d8951cd673331176e417fe33e1b16362
Range Proof
672 bytes (Bulletproof)
Memo
84848d3c6a8fa4cc04c2fd69753ecfeb7814429c8e3f4b874f6dfa9e11661dbc9cfa0ebe904352638a8fa23be6f06fce00730c340200aaf5d7ae3ccb08654b4c1d34957b62858fe1e9b41329dec4827061100de4620fafe7867676e42eece9ea4f8e3983bd8a2c51847cc67df45f6b0adcb907783a464a9101b08a1acf212b41 (encrypted)
Stealth Address
30e5a9b2ab853012fa2d30ec94b7eb06162f0caba94c4b3cec52dd5118228e23
Commitment
3c938304701e5caed90fd82042cbf74e3b2a495c319330682fe2aec342a4d213
Range Proof
672 bytes (Bulletproof)
Memo
07c477926721c5f5d4f736d7a3989a25a2c1483a3171dad3ddeccc47c6e9becc7772fc760f6754740335425e983cbcd5ee48b598222d74295c8b918d18a9f4b502562a951b43b893df75fcd83e6e845dc4908e404fd4de29857fc75baf44eb1e459b69f7a48b7e58cc978c5369feaa0488319025f6666b41c9afbcfc6815b262 (encrypted)
Stealth Address
1aff8376d4ca8434c69a2352d1e2d1b780dcc77186d54f8f55d6a8b8f8dd9f72
Commitment
8a21b75c4a57eb5aeaa974c1d339a470341c7a0f57a32901ccfe9a089bee7923
Range Proof
672 bytes (Bulletproof)
Memo
6d22acd9a11dd8d1e60e1bce2fa0594d512d35ba2f6ab191cdadb422ab61da55ed6c3faa27adb7398cc88c36353a5c8fafaa94c43c5683c76256d3b036f75642e31dbae06c908836bbcb2e9d677240e5ab7aa95e29f33daff303d3683edf4b9be32c79be88b07763ef5ecce830a08244df6ce0bff34bde864f74527bf90cbe00 (encrypted)