# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
32b64159e63299c2594ecf42d0aaf7d226f1726f6904e11bac5ae5294e61d422
Pseudo Output
04208eb57839e2b93bd9ccdb6cade3ed0b32977f1ccd26b97863c3cfe2b2551a
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
4ca7c94dfe239aa4ad4b7ff5594a91f8e5d69184593de408596a75c09497c57f
Commitment
00bb766b5cd1ad01a1958758e1009fca42e3e02fdcdb74c61eea324d1921f31c
Range Proof
672 bytes (Bulletproof)
Memo
6e485b3f19864342257e7722d0d06b681be1ae703f8a77b090891cdb0b707bb52efd900dbe72054b73eb7353a3d6eccf312e222ceedb1737a0a389c04c9e838c0831da12ff52e47f87b2576d931fa23c8933b6e76c9a63e95c2586787f09433420da89e786c8d9b30a39b6fe340eb05dbeba58bafbbf379f617b69e40cf0c1b1 (encrypted)
Stealth Address
ccf7a5ec41057e36a6a5a67d02ef58df31dd2cbf424b0616193f83437200e209
Commitment
3071edeaf506a84b757ffb2d9391930dd5961961ed75f190677e5381bdbdfd65
Range Proof
672 bytes (Bulletproof)
Memo
2569f6b3ad81f48d22ed6c3ce329fc07fff48653c1911901097391c2af679dfd6c1b07cf84330a6049c64eda468f4c927eb2a6e13cb34c8a240eebfc5ba6ed4d9ee6bf980554af0b300b0edf8b5fb4d355758a8fce9fc582a6ba13ef2a60e891ad0dca2d9344331b61fbe52b1f2751f078eb03979b1e038deec1a1fd95e46943 (encrypted)
Stealth Address
fa74ab46a05bfe4b17ae338f24da0f43dc375b04a363570ee5d908d8e39ebe07
Commitment
10e56a8b70dd6f8b731cc5c54daa845bc0a113bd5bd179f17eb2d40ed404b94a
Range Proof
672 bytes (Bulletproof)
Memo
55c32d345ca21693283b6b329f0550d351e8839cb78fe0f58dae8fce2b0d4bb2517163284444a48463c0dd3e9fed3ba5a38d319ce7e046648e4b0e794351d028884fa0ae8e69fc7fd6445041926303e501222ffee818b2c1dc6489af017ca328f5bb1f81dff12115613254072d4f239d84dee18fcbb6f623cdcce451edc31c17 (encrypted)