# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
d655d71a769f0cf394b2c0ac4c6ad1ffef912bcf0a825fb9efcc38fbd0873a08
Pseudo Output
f221a1add8b12095bdacd2e0edd686f6496926a46d2bddbded1ccd1d89a96a6c
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
1a64a17ed67e0c9ad4f0aae1517899612d06ec43d56e6b1d8d883f00d796ac06
Commitment
18ab5988f0cf99d5fcc23baeb96bd38daa5afadca61b430a22c15d9ad0d4e42c
Range Proof
672 bytes (Bulletproof)
Memo
56cf079ad8ef3d4c9f064ab73b1726e9d300232102335ec1c1cae31bc9f54349e344d3d81ec847da32ffb825cb7d9d4ac875067237dd9d0a3f2de4cd2e0ba2605caaca3ca212d66ab030c60ea91a4312aec80f6bb57c350e92a81787f6197ce16a2f1250c1f111af2f3e53e25bed60ed039df884e891e5963460f4216bc7d506 (encrypted)
Stealth Address
ac2938dac2488d8a88fee204c20544121d8f7c6370f52fec1904a17e97c1c938
Commitment
2490e4c8d93253426f468d64400eafadb19b301c369862b7ab079c6f3ee31b78
Range Proof
672 bytes (Bulletproof)
Memo
6bfc405c24ebbeeadc4ac482342af3b97244e90b30cebc27d9171e44ef3d43a9b55fdb47b0007828d9ffe92c093356c9dd520dcd0370afe0966d7d641cf141e85f428e574dc4e81bff03997ea382f933e54fcb97a4786327a3bddf5b11b8bcc15a55f9724c8aebed5f2a92809c3dda9b55ac9d88232d4dd7a8a1f49e36acc8c0 (encrypted)
Stealth Address
66c1bf89b3b6127c38393aaa61c95b642316bdf66ce1ae7edf0ef4867153411a
Commitment
94aa4b4f2be53a003a06855e2f0d922801d2bbc5958b42a6e1a4e3251640112a
Range Proof
672 bytes (Bulletproof)
Memo
5c0173705908762a5e71de93c6d5c62a57c9af352d7433e4acb0d05246a3698a70692c9be67d9bf3465b024aff1a97a3f5d854e254b1a7148b57ffb7d6314915115d450cfd2f4e2f3ff29288ca2af37775fd7d246ceca1534dad4d2283b74e016a42f013b0134e399a6888d33ddcadd1901e67cda1f7710d4ded3db0ae3b2846 (encrypted)