# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
765f50a255fce3e9e4f4a907aac7f47ef4ef1b968707d1182ba71b451bb1e90e
Pseudo Output
ba21725eeb6c4a2eef75ae0173a40131216716b9ce740b10550d7ddd14ddbe72
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
0c6401f96ce48caeac8e4c52093a2a4ceb1f8f7d8dd972480107a77ea67fab7c
Commitment
146366ce2197c6268b689cbe5348eff6149e52dca58a2869668969fa774b0c51
Range Proof
672 bytes (Bulletproof)
Memo
67c8c1fff817e861811cc1b88d4143277b2f33510b18a6ba2c33896243ef69bd833b35a598585e9c7fee67810551b8577f3701234fa620ac91adcc5b280140d786e9398eb9263a8b164e0c28c84252cda16244edee5b61d45bf153de464af5116c728c80869f52106507af4ca6228d37efc086019a92e512ec6c8a82dbdd7d34 (encrypted)
Stealth Address
5872050afb6d1d888874ef1148de57d9c4df732e46aa3df4c2c6381065e5ef31
Commitment
26d674d346b7a828058dab1179afadeded350e26620dd9b103fe6ab55e9db44b
Range Proof
672 bytes (Bulletproof)
Memo
72f38e9f7ab7a21abc171312caefb6de5a707e1f7fddf76c23824368ccdf18eed5788eaa41d18bd37f6a683732f52139bac5368afdff18abc89f89bd2fc8a2aeb7bb51ca091d35245d0ad5bf72cdc6f1ebc48dc5f9d44b7ea70a100c3568bacf1558dc222900f3c586df0236a915067e3ab47a943cc5704350b905528638a244 (encrypted)
Stealth Address
a22047dc8088a436bf151b5b9e1c34e7e8d5f55ac342c16c8533140e0e590c41
Commitment
7ef144dce8d9ad30d2974be7792e543b6c444e03b21d588cfa029ff90a043c43
Range Proof
672 bytes (Bulletproof)
Memo
e4edd3f78e5be322aefd630ef4e9cdba19a97eee9a733532e4106bc5ae74c6c54868b1c25189ab7307d621303c604a53a7611f5d25b76b8cc68fe6923963532b5106352193f7d2a22fbccaaefcc146b4ba0e10908f646841bd0eb2af0500416b4d8b7a4780df1d63836c8e6a6a9a910084421f00a600883ce519fcacf968ce38 (encrypted)