# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
b644c4d6281065ecce71a320839f39d7afbef45ba32a6e3945c71273be1b7e61
Pseudo Output
84956dc513da53f692c99a08c77031e3af756996fd0ac24c6afef6c38f84cb3f
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
64098d240fc0a9f2701334e9f56fb0cdf522dc0592c1b5384b5c390c8679cd26
Commitment
da20eb5bfec44776542d38f322a7ec2c12dd7899faedd9b93ee40d4a60fb8c45
Range Proof
672 bytes (Bulletproof)
Memo
090553975567079d9eb75314b320da26faba49ac52fcd83c236ed4ac015239af97ea601041b4e4e8b1ee21eaa9e8d60dd10d7b6a99b58f42804b9246018bb64a2a3b8782c13d2bd7e71ff5566889d3e093eb378b353e73c6b6699df6c7485d65110464e2937f0cfef5c27781e212b3926253cb483d7698ae969fcb139763e2cf (encrypted)
Stealth Address
64550181fa400a0f03db070bab6f9084c904d61092e11d0087c46cde07410539
Commitment
84e4c3383f914e4fc8536e8e1f5c891c22ada93b2a814e34322d4fb2f0dc0741
Range Proof
672 bytes (Bulletproof)
Memo
f315fd176904968049647eea2baf17ac17cccb72a544343a8e19b8f177cba8b5fb19e5412283372190f62c7c844397de01142623703bf55356eaa90689bd5eb72eec52113bc411cd43e0039d4a7db667a6895aea2a0a92b14cf03fa9c52944b3c3780b3a89b6a9eb9c2aa688881c9687217ad713a6ab523461160a2ac1347025 (encrypted)
Stealth Address
84007b72e5701799be42248ba8d26399b454870f6c84ac5901b5ccc655a07447
Commitment
9ab763282a98e41e7d812f45fab74932bc2fa77eddd14cc3f9f5c54247922647
Range Proof
672 bytes (Bulletproof)
Memo
33e1fae41080f436204acbb657c64a6aa54d132029a41efc21db5d6a419cc8e9693d33b9500f556d69f1f29d2562d31311abfaa804a918db5ffbd9cf54c549c5ebbc1046f9cd6e9b38311743ab513ce38697a84dde82115e47de3aba2cbd4cbf54291e23c3da220b745aac069031c1728ef0e00f72b12642ce35214902784012 (encrypted)