# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
00f48b5b2085369490123d25a3ac05890265c7a03da36a0e846f5a4422985c0f
Pseudo Output
2064f6a17fdd911b18082e75cfa24911acf639f84d06b2e2fe0fbae56c53765f
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
64fd7d78c5c770b5bc966439d74a0539674824d4e9991fab50586759d7063538
Commitment
94bf58a6cef8bb400e19544e34b83c7c56c1b71bbe7fcbb17da92b90a1b1707b
Range Proof
672 bytes (Bulletproof)
Memo
ce229ffbaeda2736fd3b0d6f237d461bfb00a20c39551dfe9949945e43a5240f26a957f4fd3018c82633e89abcc048ed8a780fd1be4affb30d6cb969dad8505492ec598c6e9bd79d2c36a1de6f32eed45c4c733b24f665bef29dac11101152460aa52d0992c7bada54d4006e7e027e734bd5b79f820401f250972e229636ae7d (encrypted)
Stealth Address
24f95b3849a95cdf0515982c03f88d97b73c6cffbf5fa60ceced95cab129044f
Commitment
900f7b84d8ce9a214f84fa011b29f24b4a440f39347792ed3d2682574229f02d
Range Proof
672 bytes (Bulletproof)
Memo
91605850ce8043c79f284894b7ecbe6ec23393069d13306dc704620083a63a517943ed459763ac874e5d39dfa34b3b20f965262ccf3b25eca50d9577ab4d93109c49e0c76671334cd1aa8be2270c5fef79238b91c275a65be8e9d6f2cd450d4896943aef1222c0b5d6388dcfed31f0a82bd7958a842e53e3845e745b917fefdb (encrypted)
Stealth Address
e278c3a47ee500dc8a31d164433e4ada239b19fadcc0e0d6b0eaff122b30c146
Commitment
5a602e452533f280e1e71ef6488ba977a154f3b72057b2c5e675e59811bf024b
Range Proof
672 bytes (Bulletproof)
Memo
0a97d410442d108aabf2e7ef9cca7e004767afe0f6a59e650b5888ec577616a67443b8ac25f6348f3496d764279f2f1ff66ab847ce1e2e5fa1a9c942bb3efbd48811998b861da9a4e52e9d76fc12838f145bdde2afff2ea707d6a4bc5d63608ee27f314582702f55a5eb1d5b551aede822f307c0ca3f5f6f59f4b752c7cc0aed (encrypted)