# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
10a38f01014852b65bd5926cb68f9db7c5cb176bde97cf4a99e594f3fd13852b
Pseudo Output
96fd66796777f03ae8797cba379319f89446f6288c63a566557e2b1bb7ae956e
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
6616a228373901c4e1465ca77fcf59f5292f8dd3b097993a4616c7c6e4e4f96d
Commitment
6e5175f28604a51fd5c602cc15e2e144d3f04404ee031158f9982d2958be7433
Range Proof
672 bytes (Bulletproof)
Memo
5b2bd7647c4549e756f259a39a301869d1924ecea4c0fa14cf6ec7255c947aed6ce84e2ed5cf25da977f88f84b91f92ac42f36ee3e09fa42d97f80e71ef0f1b49beb6d74731bab9ed1b6d08d7f3102513b9fb0d4a37af61dce5331963fae1b05a64fe3743fdbf6cb6d2425136bf3bfa37dd5a3963bf465634889fede2ae9235d (encrypted)
Stealth Address
045398bbffc4b4b451269386819c524842bba29fa0d29bc126aab44d27bbd76c
Commitment
5035f15fba81547f8fa737228723a2eba03aa7256fe0fde857d0d639af429631
Range Proof
672 bytes (Bulletproof)
Memo
c2f11c46ae658c6b8636b1ab0784390aa048ae1aa3a2da5499138c7a87c509ffc63416d6ec435a6e7bba3da695d32499f8997ced393bf97484b813c61af8de8d9634b4578d23286ab1dfdce5ae15a88d5daae3a4ce553e0b713775a1e6f00655b66fdb16b85333a9fe6cc49a035cdefacda456d825e446f7107de74aa9f74390 (encrypted)
Stealth Address
0e108e88f09e6abcc477438740648cbe27419be441b9c266327f2189c519bc4b
Commitment
da85dc6041e073bdd53cc72c610f50bb8e945b650fb57a72c3f8ee2e9c3b690a
Range Proof
672 bytes (Bulletproof)
Memo
95ecc5a5535e7fbc2f8f34a585d44e5c7ac12007e89d2d2bf82af3a2af6df033aea05c32ad8c0d8b909066022ba316e2d6f7d20979f2a60305db56c551aa3b6922c7486bf1591eb16bf79e5711c61f1466be91af81fa7064cffa9b48d3f0572d1058e90a92989e29f1781ec1bc1c47f5b522aa2593e1ee48d9ecb240fc70e5cd (encrypted)