# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
1472fe327b67014937d798c895b9bb7117d5bd610b92999210ae1c5e0b4a4957
Pseudo Output
fc6396594ca8d2d12d5599eb5521f2d482ba8185248be167f53b6300e505ab43
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
b689af624a96c6740aeff0dc8b549b43be9119f0b2dbb93e2d7d64647eb7cf04
Commitment
5cefb5b1e767c3551143a8ebff5e2648cb9a9872068d93024e4e09b8dbdaf013
Range Proof
672 bytes (Bulletproof)
Memo
c11d52796d7446473534dc91d4a3d385ca6238e8a767646a38586956bca44f54bebc3923bd667fc736a4d9bf1c259ea5ec6e29e536df6e28045df5f57f10fbb77ae982ce9f85bac5797af2f45bafee276e4970ec703e2b3cd128b64d48f66a76109a7bec95dd4ac4b867326b64f1a2016e1652d2579684a6ed29781aeba08d53 (encrypted)
Stealth Address
a0987ed1b8d88b0a77a343f2d7c76b1ce592bd20389c0b75c7ee6bf6d743716e
Commitment
94f2210b0adab7d06ae5dc44b26618b5b37acfae96571be542a819bf8c84064b
Range Proof
672 bytes (Bulletproof)
Memo
d41a34c7feccca102780723c628196aff72c1680470d4379be04be2966298c0571e1c84af182f260201a04037f97c85708e7b6ff99f1dc411aea92845dd446be38ac428b7a35ee38fe67122796760947dcb6b2f627f3c40774ccb118c3125385c7f736eb02cf72d637bdf4afaebd2e982a491caff05aa8d1537665c36e93bc0f (encrypted)
Stealth Address
12ae994a8a54c853bf176dfea0e34679ade5b93432be3f8df7c95bb17bcb445b
Commitment
94248a6e0b928ef0539cf025b674f9f8c122fbd39ef342933f6db55ecf34540b
Range Proof
672 bytes (Bulletproof)
Memo
2bd7b4bf144bfa3cab5a5f060d1b2c90f1ccfe3f6019f813a73b26e39d532853ef2f037c3f75e8a76b0ab395af03a552ba8e48b1007089f26a535ca7adcbcbde13803a408828ad4cf0a70f0f98f350d78d29298ba6c14c87d8d75ff1592d5e29ec4aafa3fe320ec71b20ece94c569d9af64548dbe07459948bd127d1aac74f97 (encrypted)