# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
d2246a75c002d17d789291c02fb22c0745da9d6c58d9d6af17be0cf5e3df2628
Pseudo Output
824d47ea8abc21570109fb9679e66eab07617673a0a276cbb5eec6d95458ae72
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
fc65be553fa14123c08d854812ebdfb6b175d7a3b23c577016173e609fab8b79
Commitment
ba06d126ddb6bde7b502d4c2d79274cc7cb81387ce3a79aa8fbdb2465ceb464d
Range Proof
672 bytes (Bulletproof)
Memo
bcdd1fb09679f065ae483330bc66cff13b2c54e80332af30de27ebc84ec17b5bde3d32a5ebca88a9e8d299d6f0ab89833ea53eae4a55a508d3f354c956f2ec2beccac587f1da56168d499b5a1bdb19ca601ff6160fd5fe098c2a75b6b0f58b07d5e4e049aa5a2b1fbf922554fc4a9a620f3a58b8172ecd326115c6c7cc453285 (encrypted)
Stealth Address
cedffc6f71cd0f0dbdf9bc30ecf8907311ff489c9c16000b9b6c93d5b2fb821c
Commitment
761954f75d8cce639d4e579889b0660f2ba4e0a027191b6a14a373f196c8125e
Range Proof
672 bytes (Bulletproof)
Memo
c40448bdc90402c8186d264186ead0c59d5542dc1bcba915eba1a3cc2123b66b472cfe708b0acfdf116d6fb0abdd839db97f3b85b0e16c4ce3058b1d854b9ef9d12cbb5b18ed048c48aa6357736b03d337ac3c9e2effa5b8c222e2b64bd2d20ade668552d990026bb9f941994fd3c87739f917dcb725d3cf90ba0885c1c7913d (encrypted)
Stealth Address
dccf58eaa836626395e7e77bdd7cc82609d17e7bf36f895a7b352b6c9ffd074e
Commitment
bc4a5207bbafa2254187b25e0e3eaafdf1c7136f9c55e91998b16337c238e730
Range Proof
672 bytes (Bulletproof)
Memo
8b7633ca6658ca391391f5b1d873c2da71f9aa3b8862f1f45dbc197d000709a3ad9307df4d188c937c36519e6dfdae92d135b198ff2b5af182dc17a7712286761990113ec2a3fba0c9ff480564a9ec689444d5ac19ebb974202b62238f67070e466571e365e1ef83076971f747c0a1038c436bc30f9d380bc190249b1250d06f (encrypted)