# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
362adb3add0f4b464a5ed2412cc3b1bf5bc96bb993fd87a2687386329d5daa4d
Pseudo Output
9c65b48d0251cf895777787e4a68e5e34bd2dd882869f5bfb6ee17f25b998b44
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
546667498b431b27ef634f9df9ba605888956e81e406dd92466e1ed80f3ca65d
Commitment
62bf3cae461e35c559a2fcd0f73d9963b81b8c6cf70aa2ac25ae6e0d1a66296a
Range Proof
672 bytes (Bulletproof)
Memo
20dbcb0ebed5b1a7a551dec5e7683c4fd46f9fb2ca3f1ebc847d71edea40a3886ae098b512846d56d4c5a29f7bae6dc45375139c5fdd8b82b51c6393846b99234f442dc4711b61afa03c59090e93380054779c7c5c0211f5a1dee7d6611b0e51a1b4300885e1714a76c2bac0bef8c55037d4abef183550f207ea7691e40861f4 (encrypted)
Stealth Address
dcd7da42b44b78bace31142d98a571ab432acadb157138e0561ca75cb3e94916
Commitment
9af0614907b6f66d3d1f0e19af0dc4b6dc10fab03d1e3b0df8f3c720fa461d48
Range Proof
672 bytes (Bulletproof)
Memo
896e4a61a244ac30c05f24273a30e777d0980e2dda046e9ea8144f3370e968baf0eac59bd0b47d65f20368582535963faf7cc6a2d31f6e37465dd03e91bdddb7cdb867fde2f052e9f89d88bb610a01cfc92947c6d83d42b88106d443dd5ffc4c23cfba3f2aa85b7f87eb36ca9f7e938f7ed14727bb3dd762ff5215a4c88bf6c1 (encrypted)
Stealth Address
c04476e94075e3496c1e9ee5a7fb5a510f7f0026275a8a681ea26c307a2bec4b
Commitment
26f93a2008a501848af618a890a116fde88abbca90ceb47ec2210333ba1f1c10
Range Proof
672 bytes (Bulletproof)
Memo
05ff5be3081d9d32fa0bb662174c1d9f16424ac1aaf03d532ebddca3f1dd8813298777ad0c1d39cd2a393ab7cda0a0ddba83139561b4a6a82dabf1ad0f520b1ce85ffc2bcbdb2a7b72887055a5374c9c7a6b1c9f19c18742859b46149c9352f38d4cc99d7165b8c60d885b90e0db7e8db25258ec07623f4a6113b1f42dcd9886 (encrypted)