# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
b022cfe873eb1f5df70ceefbdf6d19027a5de783bd748e4e41b0ad91e4144024
Pseudo Output
dc836a6024aba36322028469f77f80fbf28de4b923841f02ef12cc99f010b542
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
ae4b7c6c8f8815bcb960ab7ee7178119afe20c7eb0f9d498b03310fcab14a71d
Commitment
663f61400e64b4112ce2b11d3ab9cc53e947f7522568f8c33294fb8eaa96e85f
Range Proof
672 bytes (Bulletproof)
Memo
d1fd87fa147fed8b4b886f152c16b65c4085276f30f88916d23f03694086eda0db5bdc6c8177510573b61291015ebadf24a95bb8f543092f639eabeda0578ab255602d36a4ab83a2e3a70211d16de9b4289c63b31f487e2435e255bf48466afb72829da75145da5f5cae98f03d3b62dbf7a7bdc7909fad35222f0439be8e9cca (encrypted)
Stealth Address
ee65ff0055cd2afe1121d1f05882130fe7bab96cbee7cb8c9152d26c937df37b
Commitment
a409f941a48c11cb400f3d4508d4b9b91cf77cd1f937de59b3e19950dd1d5879
Range Proof
672 bytes (Bulletproof)
Memo
758f5feab25be86a6c9a72a8e9c09c19f8a81bf582250a06c9d8fee8b3fea8753986b656ba5e8f042679141d2f58c20d36d9082e89d45182c037c288780666681e060c055c345f2eb30bc4ecae301eecff64a97cdb5d5d2ea587c69e497456b53ca1f81f968fee56a3e13d9e50212c39e9b9cd493a8b316f8f1a6f9b0dc7c6dd (encrypted)
Stealth Address
d43a9b97fe79abe6af524e1f2c9923ee860d2975b410a70d7ba63d3dba02a445
Commitment
0e96b051c301f790d61da780a1bb85ec8c2acfafe4d62dfa0d29cb8b85d0b816
Range Proof
672 bytes (Bulletproof)
Memo
d3fe432c455e9d8f2743d1f814ad659d1f6c516a5b603bca5967a0bac7ef195ab896a4a19a785b19005bb9ef8cfceb9cdbce4f1c85a5ff68d3db355f48f79501ef0ff5636377255e7192f37645af18b2362b9a94e353a77dcd7c87692ab00062a03b8c3e9b1735e8665411f30cc3d5e2f8134dfb6a77804cfac19f7169d43a52 (encrypted)