# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
9645e622cf6a7ba0a632b9eea31946153e27a3676c428896970e09baa1aa804c
Pseudo Output
629edf6973ad60d045bdcc36b76aa9251cd71f1dc294259d8d36c765b921651e
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
dc598b5c83061718a72a84173657c568741ad7d0bf915e6b987afdb92e6fd529
Commitment
72932ff2b2981a145d52101f680abbb9d7327bb1c94ae9b3947b043cc0c87e58
Range Proof
672 bytes (Bulletproof)
Memo
046e06f52c8b4ed94dfb4f9a6fc07e20e9aa796966089da7b187d3fa07b5741757c9328a9ac19c10ea7348643100b02b7964f3bad29fa93024cb38dfe656c45f66b5967a70e74d68f9bff42897f9e5b8b6f35f0e22a7313c67d03052b4bb91bb4eafd7cec1f581ad3c3919072ac39045bc3c10e77751eea39ae72ecec91c8977 (encrypted)
Stealth Address
18f2cc1f64a588690b6dbcdfbf1192f910f5d1d037e6fa75aa0c3c7a2b9eee03
Commitment
26318a18a76ba27b28c47ccb89f3cf50661b3546fc87559c8a19de6165d16a78
Range Proof
672 bytes (Bulletproof)
Memo
8c88fa83033522c554277e1f35d6cc4f71ab4388542640f35fd266fd8c132657ea428543ce5d5f585054335990e23150b304efc52de1598c37a471b5c192ab653b2dafef70a82247ca88f1a25c0c64da62ccc5be2757c609e2bec80df7855eb46cdc15ede046d5061ac5f22ff29fbf2f8545cafab7fb70c3ff761a59063d9d69 (encrypted)
Stealth Address
1ecec087a00caa5f02ae5eb00ef02be140a134d4958085a4eec54d65ea639362
Commitment
08d0ca939074815325701acda6b726058fdf2d555a1360f63173ea35193bb064
Range Proof
672 bytes (Bulletproof)
Memo
b7c51eed6d0ec9975b8a1d879c9375b52e0e175d8e6f412a810809c70a59b8671ac5048f7b00eb46ed86f2c8cb20597dac309c2b5c9cb44e57654d04a4596a870debc485b245461c4ac63d295d3a28a77bd16484f5baf37d4e6a3310542fb9a07b1ada472c97c1e803436296ee9b8169cf6264a9e15eb6f55cf5e3f5b3c88599 (encrypted)