# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
563c39e72df4bb3596860fcc29f1c9763885dc7433b0884dee42d4f85373b836
Pseudo Output
2cbb8aa076903fa39c1f5e1b2642c4c9c83521fb83c7326f840ef85bf19eb85b
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
546ad6fab7585b76b5d0cd0c429f8b79f56810019995fc2b5fd781c4c2960260
Commitment
02960717804c93ffa1ec98fca207d2b8894eb6ee93ec60817034800c2efe1d10
Range Proof
672 bytes (Bulletproof)
Memo
6a02457483319065f7c7e6e3ce8f8e872c732e146f6189af80a37b24fc3839c56a0e67f5e4d4ec3314a428a3a5ab5b881d4e205ec7a051293126aa650fecf3138edf9a8fa834fe7452b0efab8fa3c342a4373eb91cf48f824f9f081b2fff097761fffc35b64b653935864b48d4815a2086d795726cf68f9baf356d28cf829a77 (encrypted)
Stealth Address
52c89b101a0a14d67951143ad7a53d556eeb48c62f7f310cf2a0273c08bccd23
Commitment
b82ec880512bf60224998747dcc00eac5a988d7d72f3c8c5e3de9a30011aa567
Range Proof
672 bytes (Bulletproof)
Memo
7887cd0920e13df37fbedbcf9ce7b5f2c7c46308788f467e64c5ab84ef1d9f83f0682a4adc6b95d091d55155ef6e695fa0792c996f709b77ec3f351f3939807f063f4388d91359c1786f4b4babecfd2c068b2b73c843078c416773b17caff8253046e8e859df9039b256a034bb6720a9171b2d1835209acb25c9123634035cd9 (encrypted)
Stealth Address
90c3d5bd1b3688cf113ccb52ae7c580ee2343b645a6ebef35fb220a21a2c2f06
Commitment
54a8300b9dfb7c101aa3fdfe904d66406c531d0edd4c60e945023b48c9e07078
Range Proof
672 bytes (Bulletproof)
Memo
de19f1bf74f0084b8eebdb5c6f1ee0c4bf5f4da6d899976539e4c50d103c7d61ccf638954e5acc037d2945b023a8bb80703b59d9f3322520972e28f7509ac41dbb415a05446fd125f9dc1258f537fcbae1c3d6a58f496aa0291a2494d740a49d41ec5ee18f06f81b11bd068f87ccff66d955517e98230313170d1a3f286a3533 (encrypted)