# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
6895360cffc699881427f59e0951faf96e8db4532140317fb2d69b84ba033148
Pseudo Output
e22cae704df55bcbfd1d2f013e78711ab3141d0082dec4a285975ceb5337ee4f
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
64d18c40f76c37cac95f2baa2727a440b06bff2580182a5f378b1a6df531070b
Commitment
98f4529c7bf30d82b97c2b6103508de1bebe2a1120b9cc2ed01be7d623815358
Range Proof
672 bytes (Bulletproof)
Memo
6a36e75f95f06b6afad46827ffc8d2042cfd805afe24877163baad2d50b98f86be89d2e15a79b96ea7948c299680735fa2e4df9c81d832e8fb4aad19b35320aff07abeb0e16f0d9a5792b5a2d74157da156bdd3338a1c748416974e043426ecb290aa4515a9e4a3803f7708a2ae5aab040c1b71c62089d3b15dfe02d0e8bdc69 (encrypted)
Stealth Address
464abc579e1e4f1465d113cf5fea14f122ca6f270ad9704e2609f4ff9155b911
Commitment
d6c2194f69deeeab8dabef34fa610de705be521f9fe5a1915131de3117c9317a
Range Proof
672 bytes (Bulletproof)
Memo
3b2e8b6567ec2e6091c34ac292f990a1e624a4d607f3b60a078891f6f3ff5c39201cc2f602fcb71f31534eae67c85fd5d91fc08703457e1dc73096798bfdebbb6623d862a40d236fce4624b7ebb192e29cc4731c5b09312c048b38f8f039aa696880614582c543e3a646c0dc193372379c8f65528a980531dc9a7bbf07c39dba (encrypted)
Stealth Address
a00228caabf04bd431495a6dbcade38b86cb7e5385a30b82b4b8adb3ed853b35
Commitment
36ebccfaba3b16490a644b288325b49424aa0371131a2381831931b58b4df91a
Range Proof
672 bytes (Bulletproof)
Memo
7e47d6d2715ff273431f4cd9189063b0e3fcfb2782d7ff40824b039818d6c1818a71baef6ec5c3acb89afa4e91d926980d459bca89c0d67fe403ec22a4ee90dd0b57b6ea14b0825ef19f48c4ab1ff26576b77a69a7247235665fafbbcbd1b6c37bb8dbe9478b0c8b815b4e56f5df67ff734bd6e2adc108c4f11b2ce28ccd7961 (encrypted)