# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
d03a479236990d492a26881965626722f1c532a3992edf49336018dd58b81379
Pseudo Output
6a92a58a396adfcccf7f9e2e29e98ed43e39ba4c2068055f9f7c31b7b29e2355
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
d6774a9743b568949fbe11afa0a3d1faf0b8a499cdacb383c0a9b374dd1b4d4f
Commitment
bc3f19005c802a159f1e6e62950e08314e4f2ef9cf3c397dbe9cda174bbc9070
Range Proof
672 bytes (Bulletproof)
Memo
a5c1581807c88b140dd7643f28f5fbb425edfc10febf0c4d56cc14a9dc4948978902a1d7b8ed7d82f9a8e4725cd545244912cba0fc52a5e961f0ff123a302d38bd166bc2360b66cccb359ba49b31f77c9302cec2a11b44fcb024f031dbff5f4636b2cf1c04db4e43f9c8ef14af6ece4e9379bddb000183fd8738f1c29fc199ee (encrypted)
Stealth Address
18495aadac53b6d53f035f54978b976627a60603eebc7d0c0a2fadf7b3fca248
Commitment
c266a6706cb7eb3b64319a367e15d19e3b921dc19251fccec3fd2eb5cbc2fe23
Range Proof
672 bytes (Bulletproof)
Memo
d1e6d46fff5c7d95bf838a83c898174bcefb448bf9f59d5a5125a641d91569c4720222e16e4489344702b8dd00b9ed012b5877dee649d068b6dbccccc9b73ac38fc10f50cdbf5c9f56977cc16488964e3cf968fb6419fffc58286eb91dc72a94b44d1382736d1037e9b121b744a3496934f4cd2c73674018a63920a9213d567e (encrypted)
Stealth Address
9aece9cf9629c576c18db63317b34a1768addeedfb7b2d2b7dae15022f2c7b17
Commitment
487d00a087160322cb788cfe7bcf0752bef3d9bc7dcd8434813ee36b8958d304
Range Proof
672 bytes (Bulletproof)
Memo
b1c0e42396f28166468e7fea6a0cc95d1472d9e0fc7473758da661249d0ebbba0d559c35482d78a3d3bf076a2d07ee919f555946afdafcede0ee4ca19ce235aacfb656613e2e546cd43daaab16bd3da670cc20d66e69d5159fd4cadc5aaae09df7559be3ea4d579c7bd057b21c92485c5b4ba70505bcb5dab617237aac1aff23 (encrypted)