# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
068b4e6cda462be29fc8b8c4fdf53d29b4334595c219b30a620f50e3523ccf76
Pseudo Output
16ab09e9e0849a53e2d8214821d9b35a48f35b76f2e2e1f7319bad80f2561154
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
f65a0bea5a62f9d6d8b7970e6b8910430a260c9a331f156096b2fd40d7ecb634
Commitment
d4788dfad55e061ed3ab7b9e02cf7078e5fe1705d4f4f1c0233e0a78da8e3916
Range Proof
672 bytes (Bulletproof)
Memo
5f2810a6dcea3a318bfc5bef671c485345136fcaa267a5ca64bc56fee911d37b0393ae66b0bf750de37d010a77c69a076a770536fef8406a6d4b9f86f46ccc1a69abf8056054920095325a6511d6497f8d4bc1391f3f2fd3a5d0c77254f4831ad951d1bab6337c3778c3db89341878aa060a0c41b25f7ecfaedcb5c1cc11fb7f (encrypted)
Stealth Address
b2972af06e8b3422d656ff12cd95739e870ddbc72a470d1d75f7ef6edee1242d
Commitment
3ef532fa9fc132a89d4300e0db549a3bbb4a990710ca0e4da1987c9c04bafb6a
Range Proof
672 bytes (Bulletproof)
Memo
42c620259b96a91f2cf5ca31776ff482e7890118bd80317a0875682544c90d2d99724f94ca3581812e36bd5877c9478458983e86dbc092dec4de0ae4aec1f983b40b325812509538c0858d2c63064c57e4b79646cd829cdc462351eef669756f780d74472791045123ce39f8a586051e49a6e5c5f9eab0e942a3b3978a738f4d (encrypted)
Stealth Address
c65e072d8076c88c34ab86cf3616cd4f81c041018aea5e98afe9d41e2f80835d
Commitment
c4729a35e6407338ad2b05c0f757ac1581847a69d1c90fed1fd61e7c04d62710
Range Proof
672 bytes (Bulletproof)
Memo
03c5b24eee684eafcec47d9a1a7671c40dac38eaddbbd3884eec55bd980c30dbc3bd1136603786a40e5a5c34869822d46446d4509cb271a4640fc827f193363a2758d734b7c18b436ea2a8340c5acf89db52d6beecc4a72b1c69d748ebe360759cc01e2876c1ed56deecacbc48a13b5bb76e42d69922d6f281ffb1984f782c6e (encrypted)