# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
48e7c7df78ec0df7428cbf2abfa225ee929ad8c7ac2e2756ea1099dd4ff73f0c
Pseudo Output
d6b8ff6f27c0ba09595cf2376f793809d7ec2919e131983016cf761ebabd4856
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
64e2722f24a5ecb49f581f5ef69e617b2597174d5be1f0cb11306f35157b444f
Commitment
4248b1d2defa7fe275dbdb3cbacb1663e96db07e6479bfbe9c8a4b93a926fa75
Range Proof
672 bytes (Bulletproof)
Memo
c9b3f69e3d2a330e552da5b9ea924881fc71730dd087b0b962a1d598ff08bb4704db49727dbe0e35cf4ae11dee5cf2e9a881c666552686430397b9c4cfbc340cfd460224df055b70d70f0a2b8c7728bbafab6aed5917a2c68daf28f8cd4013965b0cc025dc2599346de8a7b4ba8a105dae6926cc3e6d507659b367377cb4b005 (encrypted)
Stealth Address
a42aa6dc4b5bb4e01719ad7d6aa9d47e662a662822123a87dcdeb7ec921e211d
Commitment
cee05c57838be726120de12bfba1e39dea827d6e05763d26aa4f566835f65511
Range Proof
672 bytes (Bulletproof)
Memo
c48330f61b5423e13b9848f04695a4b595437714bc94ed23bc2b5195af12bc4d787e02c56a0c0c25539c3236e3d9fc725adc58cfd1d2f356898782e725c5be672c2d505c54d60b44cbefcd40eef1b2c6522d26c868f5074ebce231a59f11e3a9130cb9c22119b3aae112eb27d76b69e8e9b07383c460ca53fb1d7baf88d8b8d9 (encrypted)
Stealth Address
40869c9a24c738ff63b3bff677425630fb5b4b97e58c04c321a13a84907f9523
Commitment
201cbfea1da9a38896994d3636f63811c111bb2c390506cedd69f3cc2595fd79
Range Proof
672 bytes (Bulletproof)
Memo
246cc9ac2bef8bfc97b14a9c8c8e4856cbefb72eb1b17f19ad9559ec227fce741e1b0bec835d1df6f8b659020558a4888f3bad07b100bc3ab9262bc50589532f1ebbe1d1f1f5db6358b94a5366055425f485f9a5436a81da9222c52a86d6056d797e4235dcaaba6c687a27473aa07517d200d86b6566d8a27b70d212614ad32b (encrypted)