# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
4e0374832e299d8ba6c0e1f8045129127d23e3315991673dc876d69e36c5383c
Pseudo Output
8e3966116e96f3132102c538c3962a514e82052da143d434c749c4ac01eea233
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
64980cb2ff1f05fd757f05f3ad7c22e4cd892156e9f783f9b6f01b99b87f8829
Commitment
083cfd6b05f087d6510832ccf79bb5fd592af055a60736a4345d50d849e21720
Range Proof
672 bytes (Bulletproof)
Memo
fbed90d33466845fccfa0069be7420b2dab7dfb6454d80f1bc8b23db9736b38844267013f562ce06e7a0ffd7c203eab49ec07c9e0e1216e978674c3bed9f509780dd184e19948c519149279389c57c7957f6bf91153bf316b9cc41d1743dfce3e219a64f00a34ce0966c41e71293ca955af4eb2c03a7fabf461ca0cb5e74d416 (encrypted)
Stealth Address
38a8cd09a415d719e4b097d8f4e856e9df2970cba2774f6c6ede34fb731acf46
Commitment
148c287bf56fa89c49619a25f324fef9805710ea098d802ef40c145336e1714e
Range Proof
672 bytes (Bulletproof)
Memo
6f342be4d9cbcce96f5c2442fdd068540fa91f071c9758ddddd22ed9c07581729cf5237181dcacc2c5f95768770d111e885648edc6106febc5185ac60d2d486c7ddc673b2132f79fb75610e20af3a958925b377fac4a4386ab4b413efb37cf6bca0b67cb772b659d2c11e074df70402667767e2adb679d52b130b42db302a5da (encrypted)
Stealth Address
3842229f58df88f70366df0593a690a20477f3c9a2da4973e668a228cceeec17
Commitment
c87be834fa0c9d413848e95e4d1a95fcaa82a63f4553a1ebefcef1a68151c601
Range Proof
672 bytes (Bulletproof)
Memo
c67f1b303abf345ef16982a68cfb01891a5b68dbada359236bf64a02634b04210e54d645160fba14a0c0bc9e6b1a3369321286077e7cf0ddf093ffd4ba53ed2ce0640579b7fa0afc41e78fff21ab4d5af7fb814e46055423addfa8c786c7400c73c22249f36a38401dfbeaec8c9f17c1a972fa8ac5e5b14da3c90495e00a01ba (encrypted)