# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
966135e4bd8328fb88f6fbc087f88b3021e5299f2247e2c858fb7b39656eaa48
Pseudo Output
98f1bd47c8b3add2f9316f64f0edf8a1fd0e767603d07b1f979ac16616ac042b
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
a6fce65c30e9ebabce702d1a9fceafc558998a5057441f66a5ab5273b4f27905
Commitment
3232549c31f20793d29cea8e2cdf59d0a168be9398afd35aee46dd38ae3f545f
Range Proof
672 bytes (Bulletproof)
Memo
53fd9abce63770c185a3a1f097c803dec37424d88dfd0850f85d3853fcb6b99578609e8fa7a9fe9b7f36c030e4df8ecd5e5252baf917a532b39af9f2d7ffc98340aca38b536fc339e350aadb4b7998676233df5adae894f54781d0ce385d067861fbd55342c2f64ffa171244ba7f9f6c80046ef9b809d18014d7774284df476e (encrypted)
Stealth Address
32bcc8256077db76b062174aa74c212dcb1f763c12a905e82f7af3c2f9b68433
Commitment
1641502a2d689c865055940e53dbad73ab324d9c7ede2f78abf62ac0962b712e
Range Proof
672 bytes (Bulletproof)
Memo
6b3c12f325ff24dac9a7d407f2d8046c08ab1667736f389f9607b05f63b900001222f947259e11b501218fb55a3f600dc5c7ea0b06273f29a1d01644c7039eba1518ab4b55fdadfaeff96b160a50508899808511a70e41a4b39ddd661a974abbfad252ff3dd7af8849f1031862378ef96ce00700b4e3ad111c0c107a8178042b (encrypted)
Stealth Address
5cff232d7d2fe9323b51c5a064209468b8f4b9e863b05b1cb2a84b182f39e323
Commitment
1a822486460f4bc5c816deec9a583523ab88c0f7b5d4e03a89611c86e11d7631
Range Proof
672 bytes (Bulletproof)
Memo
dd3105dfcfa946172877c7d5c9f533500f3b07b0e3c44e79aece6cf54ded9f2a96dd8b7bd689066977d3a313beeadc6f3d167f5117d005044617767387df92b121b0f8d1057d38384fbb7852145c67152f018afe87fb33d9c2371486f58454fbb242326d854d3e74e779cabf8c994b91a01a9c74096241251c39cc5dc960bd6c (encrypted)