# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
d4f94d450b53b4dd5fe8db2936fb844f9a80a5514422d272fb50fa207b214d5b
Pseudo Output
de5db4d7c7f8b030ea697eacfe53a89aedb43417aa68cb9e6ee1d1da0b9e3c6e
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
46d5d64cab84815c81697fa64c00f6f876d87bff5ea06ff0b4d243a1294ca32c
Commitment
f67bf0bfcdaf5824ea6655888724c943ad1fad4dfd3180fe62a15f176f975164
Range Proof
672 bytes (Bulletproof)
Memo
04abed168135b714e9bc00626f9dc81004d6cccc1b226c9add7ae9ea08f733003ccc2bf5ab4714b66d688367d1fc402c75b55496bc61edb60d2018158b3775c3ff7955b85d286253ed29b454d7129613c5a0176d5cff9c46f17a3c0dbc87fddc57d1e50f7d051604dae42dda419a61c4421378e2859dc4830a3f62b0ad2590c2 (encrypted)
Stealth Address
8c77691a35aadf8d064e90cfe2e3e4d7173cee4f1a64600da3e45cd19b809c02
Commitment
f634ee7a75ba37a3fc82425f7177442269f69c7f62c1f979dd5297283cad0e4f
Range Proof
672 bytes (Bulletproof)
Memo
a3093cb3fd0f334728d86406bd9a94e454f87d76255d0d83d171888872ea25dc9be522caa7e6304c18c1090ae7e80fabc1a3f03aa2e93ed1a48636f0ae9684e699be58d387b1682536a1c55e3e6b47960659f1b140981ca4f6812db39720c686370a32673f3fb90e92e6c411bed391a23ae1d96b856da5f2c1778fd65a74a6f4 (encrypted)
Stealth Address
ba90d599ff6fec1bece2546942177e2c9bacce8057f94f0d7fab4562c8e52051
Commitment
f410299224c7290fcc9258213efec5b85f3bb9de7b6cfc3c6db41b84514cd62d
Range Proof
672 bytes (Bulletproof)
Memo
b2e700c5d2364e4e42173901bd6dca125a5b8bc33c43aca0b351a3a66c3b067a3289bcb178ad69d7a72f1ba61df688844c044e63c557364c7db760ad552aeb3f727b3e732518b5a03bfdf563079fffffb63654ac3817280849c5d165108127ac509a29f239325d5fba7ba827dc85486dc7449016dcfa0ee4a6f4090a55b52abc (encrypted)