# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
84221f975a3efd991746a6790f85e481930c01c48610b039b683513aa5de5810
Pseudo Output
6c2c2a5ddb166e40cb865578850178cdd09c037c9d925db40bddaf0b1dc55841
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
d64decd13000afd7fe1e689e3631ecd2e14c4bb97767fea7cf95cec5018c3d46
Commitment
d4b1932cb4cd3021ad338d39971c1fcf5e4acf4db7b33d770d7d306df6273f64
Range Proof
672 bytes (Bulletproof)
Memo
44714f105a6ff702a4e35e1ff4dba109d6823415df5a6a722997c6c86a378f9516ea3e7a746771e229d5977d7f5812e188aab02ea891e217653d4c549eda4fb88d9d82c0cce5e7ba7a81c9a0f47b2e0121f02d9e78f24d10582cd93e189be7205d64ef6155160a5995c082b68e3a962feec654465924643d35868b3785d84fdc (encrypted)
Stealth Address
ac7c7f44121b03f01d70a2acc5b70b3336d0756c579632c2400d00748b427d62
Commitment
627d50c49c6e4a8a690863201e18a15e502f5c780a5a513c56cc441117739f71
Range Proof
672 bytes (Bulletproof)
Memo
d59689e504349e0537b62031fd600fb8d6b386a796de27c0bb53c41447f9d08f83d70c51e56e2c4ddbbdc1eacc859514eecd5b255faa8a56aed01244bb1e7f871db64d68b80f525a0d88f689197fe3adc0036791937edf7d5b43b85df6f51ec002e9c203d9a5ea8bb84e0a77cd566e9b111071781ee8280900acb002dab182c4 (encrypted)
Stealth Address
2030a8824f26f4a867d3f87e161f8c85500f69948afad476743b34090e920155
Commitment
9e8c8f243d2d45cc5b01658edc9b1505cb3e9d02a1ba51fe98dfabcb2ba2b912
Range Proof
672 bytes (Bulletproof)
Memo
ed7134536728d999ce0c97ce322de9f4e8e25c334f89d1a079492449a096527cd3417031082675c2ece0be88bce00b6ca53568db589791c337ddd8ef91da7a107d533c950d4c17d0f1b43b6e17861713bc209f29bee135c34d91c05370cfee1b545556f70167d00df7c4c23185b38f5e9fbb34e89cb766f5cf557c4efbda7791 (encrypted)