# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
9c967663b71c7dc94368b674ce57d42a222cf0318e68895f1f6d81a8cc9f4400
Pseudo Output
160a3c42d876a944fcbff73c1e2433f8c217143decb190d2a06e7643514a887a
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
4e7a4a7faf0d65e4300fe06eec1ae0c4c9d6adbdd159cd69582327bb464b2861
Commitment
d27ea68561b5007429be5f6a000e02c400268edb531d09e46a3f6e53a6984f62
Range Proof
672 bytes (Bulletproof)
Memo
b99ea20d847b7c7341e9b0a5239b0c32e157695c7a707411feb437f066ec3583a8e45582e9eb0985e11c9df17449f7ddf47e2d86da76c3a383adf307abe9375a9f2b5c5406b36f6ef6b188dde866defe76022c0386b4f7c627a8596f86e724ed16b2a89fff29c087d2c06409ec2244a00dff67e61856f05ab58c1b69fb57690c (encrypted)
Stealth Address
1c41b6ab5f83d2576e2324fb71a707bb2eb6fb9bed4da18ca41fac5b07729b6e
Commitment
64c348865c52d010920f98711ae05bd9cd21db132dba7e06652fb14a749bb327
Range Proof
672 bytes (Bulletproof)
Memo
306070f3d6b4fecb67567465e8384c68b0d71e1ddba4023e68a160e6cd0533fe910f4dd61b51e10c042249ceec8b48bc1d56d8391dbc5b398effcc37a19495f20765c7be23fb1cf88c393ee2841f246c64398ab6d4a7d8db79e35473817a52b740dd905bc4b47084c8304b08d188653401965dd1f875cfb098e49aece2509051 (encrypted)
Stealth Address
a00deafc1fe70ed1c9da13b80f30c14776e7489a7156adc6153ace9705f8026b
Commitment
ae01e1f3ec5d3909a19c912e216a972bc3fdb5ae36cbf3f1c60670021a8b2106
Range Proof
672 bytes (Bulletproof)
Memo
325701d91a20463a7414e6afd6d45211a49cab68176c414ec4ae4bad0a2ecdf158c80074a7b2fc964bfc3503c4a714081e5f666cadabefe383e06a77cac3567328639647263e3a1e1d2010557435b3afbbddb122e349e65b0f1d92a19e97b5754511c5e0ddf80bf87bafe9f36ba7a9a7bbf1c60c57015cb1c27e99428f7d9165 (encrypted)