# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
d40b0277d24b6ffbb71e953be9a3b5a386a3588485851c43b40755f314df3e2f
Pseudo Output
648873a4751522ea980e91d38375d9f5fd02452a784fee4cdd41df11f9fbdd43
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
8c81c1a6fea9af79d048576e853100c94465d03661795aafb95722c5f4a2811d
Commitment
c4373082425f6d8ea4f20de9abf1465081efc66921277ac9c9540f098a76284b
Range Proof
672 bytes (Bulletproof)
Memo
f8158a6897cb1345e664836205f14408e9450c3d54c2fe2cf6da0f74cc32889bb83b5320c5d483abcfcb216315f8fc51b85924477ad443a4f868d51790ecbed4282567bda348a6556bffcf394e658c49156ee555fd7b5aa0c596259d5cbc95703f14e1f2ecf47ca34100b7a4034f9d873e17025812b65957a73dd79015ff5da5 (encrypted)
Stealth Address
92c4f1687e6d438c222c3056aa6d62b5bb658e0454012029087a90729539d062
Commitment
cc1e784eda2afe2f0242d5263ec709e8e22d9ff38c51180ff990cf1c9942e439
Range Proof
672 bytes (Bulletproof)
Memo
dfb0022424f3d21f987584652d1373e59f827beeb1fb167ee63144066e785c6408d9a8217d37a716d50bf2365c458cf9b5c6a88d6ae61909847e6b4c1c7ff5f5fc4e2a3f404c7ae6ce51f1290ff6d47652c8710a0416817c44e7d37a189e94c2de77bdf44f168ebf41522a4290219afdf2991022848487b5f9a5b8097058ceec (encrypted)
Stealth Address
dcbe3c6b5b3caad8191c70b96b518f3d4c03b82814b505f4e3817f92c82fc44c
Commitment
12bdcd85a4113e6e79657abc32c31f9c9a314a06585b6e0a10a09fbf276c6508
Range Proof
672 bytes (Bulletproof)
Memo
4812b296ceb04f684f806ab6143838d28b950b39027846fa5faa97e8c07ce445dd8d516ef2b0c81575ba04fdffef6c9813ff884a7e6acb9c791fce9528aa709c6bae2a37efb3e34abb105fa04f728439d50c39158dde1e6b96805f89377b1971ed8eb08e745d035f123996976b20126873dc8da25ecfa15724c190d7c489790e (encrypted)