# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
00d2c68c1faca185d9406b1832f217742a9696dc1cc53dfabfd48d44d6ab6a3d
Pseudo Output
96934e96b661d72d90cad1037f92aa8f99cbdd052029864a43c2fb2005ab6145
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
4c417f89ace2eaddc67c0f93dc0f892ba2f1b852d72a281c36a2224fad8a8e0d
Commitment
024fbad9ca0d8b15d10ec52d10763ade4f49e7833467ddc9532f34d13e167f25
Range Proof
672 bytes (Bulletproof)
Memo
8e0c369226f7ceea2ef217d0df0bd9a73065334e86457f9a61315532927b910cd85a455c7c49fb274e3f02459c25f42e1ff0e87ee49be8219f111bcafe26ab25099f504d4b2a95939577d26365e9a7f1ab106dd65b8001a4b1584487e9286b0ad15f8224409b17d97d180e7a3bdb681677c1b09b5f718dde3993db736cadabc1 (encrypted)
Stealth Address
0e2f56443ad84ce73cf26e4404947a23049692954afe0dea0c314376ddf1fc5f
Commitment
047f2f4ba3e9894a3df36f5cc59bc8eb7268a03aed06653cc697638b45cf0343
Range Proof
672 bytes (Bulletproof)
Memo
efa58d751a060ab9df02b7292a3a5ae8962ecd776f0bf1a2f16c860825499201001af2548e0a172599f8afc7ef18399fe31171e6ac804d1818f7d9376fb5ecfee6959963e962c9a244c1e5f92e046f90ad5c2263928b6245f7b750580f595cf38d521b08a76df6775c4f4083a2854e45e8a11f2d458539a8eb1cba639186c3aa (encrypted)
Stealth Address
a87b2a5bcf4b2ee09de032fe2ad0bc5562ad56f5af9f8bf73797d30ef0854106
Commitment
50db61c0ce9a76a801a98f37ce2f6fb43b08aa8d849a74f26bd6540e651a1310
Range Proof
672 bytes (Bulletproof)
Memo
019ada74386a7cb889bf2db589204b8f394b46a0e79975e37c0985a3e30c1a36b04b46ca02e38b0608c6a077f4b59414e58f012e2a932c23e41f927d1a74c8e6e03a2062bd1cddd4e13602ef9d0f2a5d2b74430a51e640d5805cc88dc964c2633584a3548adedd23abd042418cc56d5fa2a95f2216ea02bd987d160d18c48860 (encrypted)