# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
9c85fb863bc7489770962441832df63cff64d0d58e6384a42104e3ad1bed5056
Pseudo Output
76927c5baf4489749f7679727db172058969b02a80a9b9f1b0e70fd280354409
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
64b9781005fa6c60b5897ada61bb3e7b4e0b09b5792415097e9be51fc9d3a879
Commitment
1c182f63982008a7e8067d610830c7239283c5b07e25f9a22262138fbd2bc571
Range Proof
672 bytes (Bulletproof)
Memo
0ebe46b4d9aa0c5e970d3ec689298b69ba3054edfdd3982646d18a13d144716c1d68b7446cd37b3ba41f4afc34dfcee1d70a3292f1bd04d7e8b6cd1988ed888c8f8b4a0af7c9ea7f50fdb4d8519e845d355a0bf7e29ae53307187b73eb7aa2c67e4eeee69a50d81ad9d6433b818cbd4217dc3be42344428b123f4f2b28b9e0f0 (encrypted)
Stealth Address
40e0906cd4fee523f45bf73a667688d4d00629f16b2c84deac7085cfe3459919
Commitment
62a87d198798bc721db954c33ba5e8c647d0a9b6d83efc0fbdea3ca182f0ee5b
Range Proof
672 bytes (Bulletproof)
Memo
7a0d93fd4921f883dcbb1930a7b87561e55b84696e5d13f5cbebc60043f44637ea3e1b08334cc3ad80dce8a860422b8ea576a23c620caf61be3e59e45df7f237acca503123bac9b11925e1b070369077ce36d29eb0941e346ca914ff125885fb27ef4e8ddef8e8c99b3ce4b941fd9d53022297188aa085c8d66e10d5a67e05b3 (encrypted)
Stealth Address
f402092fa300b4f929831d75e4db9d8c12be4441b1841367a9d95af56aeb6c67
Commitment
206daac527ac73ce5d97a92e8405e4c5ff3450268a8f11a2837f5f3af21cb379
Range Proof
672 bytes (Bulletproof)
Memo
adf5d0f37e2823cb2f678c8173496898224d5b2ec941c51153df40b7582fde3d0367b994f436aa153882b516edccfabfb2ca580a68f07a98f2b7d2e42b22a453b68fb48229345f3154a70f7cdfc111faee8924eee88d58d3d6608e46eaf898efde62013612a673e5a2b45220121bb9e495b85b96ee5402c2cf2c2ff32fdccce9 (encrypted)