# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
76d1fd5ee42f8dd07826beb93883622b6e957ac2af9b1d7561f0a795bb7d264f
Pseudo Output
d6e5187dda5a0f9c286f2c0d178c66d65ed938721f5ee757ba12712958817848
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
ba39c972dbed84b8861b71bffa3e7e4c07b548385f906c399cea5d252e9dd705
Commitment
bed4521e868c4e6e428b335710a8f2e968eb20190e6bcc2df6672ea91e03ad1a
Range Proof
672 bytes (Bulletproof)
Memo
551a6e5bcf663b0949a3c9b6fb313e667f61216705e69acd3824e85824a6199ba8d69af725e48708bced419bf9ce274afc27378d3cd687926e0c5e4435ea6b247514604acb0b7798bf8fee2bfbe2fbfed1f26ff106b829513d843f756b3dda12a1c4990dbc523a6a6ec2cb7731348f8049bd64c190aceb0ffb1c13594366db52 (encrypted)
Stealth Address
5aa9065049a1f15d8fcad95e9ffc06738ebf9cdc14cbf72dfb2039965534bb51
Commitment
6c4c10661b466abf1737120977dc3092d444d3cc3fa0aea73cc4c28ff898293f
Range Proof
672 bytes (Bulletproof)
Memo
86ffa3dbc2c6f4fcedd4f10197eabeb523afe59002d6b5daa6c17273d5a0b69380c3e344a5de71f2ac0cafcb5bd68d4724be252b93ae4dbccf3084064965adce8cd976d2afc2efd5c1855e2d2297132c59f1b79faaa2418bc3d01f00176e053a3ca26f204bf943a0141282076802f99f127199df825efe0b854cbac0b4739fe0 (encrypted)
Stealth Address
f631c5eec4a06a03ab4a1227ba8d03c31c31f131f0dc2c119336ece6da33c13c
Commitment
d0bb4eb82772a829ca3d3c9edac5d3cf176db182faabd3039ea370866784af3d
Range Proof
672 bytes (Bulletproof)
Memo
c21fcd4416bed096ab4ad073f5d796a57cb37f9fc981c4e726d56a81ef3b856d02d324048222d4beaa0c8d0356b6ac699f009727b0e3648bff060481f15b02e50a75f67ddb35038a2650e9f99e29d21e2540826ef233867762ddb697b77539aebb49f7814e3ec0dff1c1dae19f4888999acdbe5ceaad881262f1958e927978ba (encrypted)