# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
d876e3310550a1819c957decb6b05f39ff07a00d5e65875478b0ae93815c6258
Pseudo Output
6cc411e1f8b221adf17cc5d4f6db7ff3b2a0c71f7223d78e3befb2f652d98001
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
4432048fe951d4f3950bb39e634f0c53236f69ba08b0c48a2fa3457127ecac02
Commitment
2c369fac50b65993b85763e6b46e08368664544d6ed4e641a6fd68d7f73b3d7e
Range Proof
672 bytes (Bulletproof)
Memo
983afb08fb293dfa6cf20cfe47de235e66fbe5dc9eb657a4532e833a96d5e6229feafe0bc3ed6db90947b95b4e98f5ac096a130d391ba7db78125331e75bf79c910f587876e99c67d5946c2bcadfd2949a3f26fe8983f5cd97bfd4c56fff9fa431a583344ad39b9bcd2d91045c7cb1de4e452bcc6a2581ca7ab14db81276a56a (encrypted)
Stealth Address
baf21db262c1dce6b709401ff86d24c96531364a61883fb27282dd938bf6c455
Commitment
184764b32f455275569d769e4f8bb8f8db8c54026ef0241ffb83430183fd9548
Range Proof
672 bytes (Bulletproof)
Memo
c62472d909c6cf58f4f83383561175ab16dc3c157c522f10ba7e60f303b57cdc250c614e2e4b5329c3e04ae7369c0e9cedf1cb25635685e79d22fd0c1bf80017714de32280255ef53dddcac34f69918d57db315db86d18ccb95c323bbeaeb4d47c9606c0e395d160a1446b97fdb3600e59801b8a4abdf90cb796b72b8a7a9d44 (encrypted)
Stealth Address
3e3e94d3d9a99355751c61271aa32378f65b8a314b76316d5b15320c8de6fc19
Commitment
ba24110be39f02b70d90ec235c5a6c642d6bb1e64c0dc4ac2cda263e4ff7e916
Range Proof
672 bytes (Bulletproof)
Memo
d2a9332d41fd216fcd3f1fab660b777534f12ef7f2c5e2b6ebf37502b41b3491ff0109beb062aa4d0c0e0bc6e375ec24b710cc7dbc364d0f5793907db4e270361b26d31fe365b7ff2ac4e5003057833d8f97dc8f5db9462750070ec90322f32ecee834cdf1b53ebe04c57bf01ccd325f70690ba0f42382d13c8d4b604b92b086 (encrypted)