# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
46d8671287a47013f4f379f34786edd5484fa37dd8067260d3b352a2ee01ed2c
Pseudo Output
c41073caa2dfe7ccadd98166100d91c960ea685c5466ee838a9a9fbe263d1153
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
a070d55df2b34b9cdc94cb8c53d16620d04df02083bd5a0498bf759dc87b7026
Commitment
cc93b4913f059c5177637aec8c97ce990442bfb1b20a317d3b9edf3bff6aa62b
Range Proof
672 bytes (Bulletproof)
Memo
baacc93bbfc7cdb7e0e799d67765d562c0c123fa431f843525c0ee6469e8568e4cd156098f1aef6de1bb27b1af2873807fdd3178cfff72d8ceb000fec82e820693a94710f203ac31277b98d263bea6bcca479ff45669e67baf6a13c0ff8876807bb2fa7af24b79c775150425a39b5b561e9e89d11169a99a1c12bc79e9bf079c (encrypted)
Stealth Address
9e65fb02be4f5c587617898fa5acfdd764e3ebf30927fbfb2640abc999b3df55
Commitment
d2ea79d3963e441d01a55a315ba6b9a4726c359c5b9136478166de238bba4e02
Range Proof
672 bytes (Bulletproof)
Memo
bd65e3ba8b0648d181e4b27dc6fc03abe403e6d2997bb9bd2e73ef4a249321cf268757dfcfa8891e5bb346693ee8d16609f0696473d6b94383c2e91db780eebbdabbf4b0a0d6ba8799499a799ce3e747d534ec157787522ed59eb0ea1e95284078860ba3ecdb3a5e735311a5041e1a83d9561cc122db2669e90b442673a2da82 (encrypted)
Stealth Address
68d1df41bdef87448969d3a342e4af78d372a9bd7ad15ea0d8e6029be7d5c503
Commitment
22fd2fccbd9887797d6df3bc5082284d21ec2583a1b29ed4f9f4f7b8db511548
Range Proof
672 bytes (Bulletproof)
Memo
5ad8634b9666626e26d451fb8ed27c424ef0b873d3e9c095de30a5fe75ad9ddf8d092f28f3e2e9889ee078eff7aca6883ee9fa6e8196c18f87f6228ea52548464e7e2a147745992efbfc1f091faaf2b1b99ce993443d3c1756963128d65d9baacc4e1c3e3990d462cd8e2e5474cf5d7af5e8ff0122ee1c9c3eff5b40248043ba (encrypted)