# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
d244402a857745f3c856cf677703e0f0184ff9b44d1d3dd4d6e23b25a81ec90f
Pseudo Output
b83da6a35deeb07d2a65fde8e98f53f17775b685d7ad38e9b441cf202ae5ba37
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
96cc09ee66aab65c9bedcb40d3e823ae02ed573baabd18afc144bb3f71042f59
Commitment
62afed4df5f65eb0680a71dd74ebfd885de2ccac9e6cb8f5a766b07896458270
Range Proof
672 bytes (Bulletproof)
Memo
d04051bfdd2787f3eab09118aa7ca4522116742dc04428a5d6a4b009c9b2887c2aa84358704ba79d8e36b92403c5b6d3550667a4eadd0526557a7c229279fcc11c1e4b22fee617dc56bdfd3db1588038c5e0cb9a337f8ad5e907f03d2f91892693358d087cfc9031056f9177a7809f3a3371efb2524344b984bc1ea32e4cd7ca (encrypted)
Stealth Address
d6d19e9ebbca34654c95df852d1de3f1d8bdd4172a3e3430b200eba4d190bc00
Commitment
aa27ea0c2c65f52b6753070d79594bb410ac9473c151734023d8f8ad9be7053e
Range Proof
672 bytes (Bulletproof)
Memo
15bccfa522597e31a593fb62aabf20eeceecc2abdaceaabdda71489b05dc7df51f2574f4e2c4acd03fdd9e3573ab7ecff801c80b55aa713528b00ac0a01e86bc60d9370177fa4779debbf2774ae09d226d93df389bfc32a2722d091a05390b6659a9ecabbd91b18613dd6104336b6c762d2378529083dcccc4b800472be671b3 (encrypted)
Stealth Address
90385f2fc2b6051a35ddc3c535c2bef3b4791893b2ce8dfac7c115a416fb5528
Commitment
7c6466f1113c4625ff54468c578f717966c008f024e2f27e77d9a00ee14a1142
Range Proof
672 bytes (Bulletproof)
Memo
b3adc9ac0a3b92a08e86a2ef420f0915aa632c10bed046e4eac7652a132184b3d36afecea6c696f5c2a885fc765dca6ea14022c66ed1d6e28e9d290dd9cf104a13fe7d9afb2f916214de6f7434a8a76192a8210009d4dbc3886af0a8ee2ef0ee3c8291fbbfa8c9a401eb970a3a4d472a8b492dc16cdb10bfd0a419a90a214c6d (encrypted)