# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
f0f3eaa66d988b783ca18b62caedf874de1858b84cd1d148caec77f4b3a67651
Pseudo Output
d8a2a3e94db20e5ed381549094e9fe023d7729370d98622b9e7fb7da974d1f05
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
feb1fd119bb9fbf46437ae7d1070c8044deb2f00d3ee66ae1cd2142e515fd57b
Commitment
c02c038b12bad2da3dc11483464a42fdeda3fda372f72bbdfecc8d9ec47ac14a
Range Proof
672 bytes (Bulletproof)
Memo
d63776bb149c9b13cf7a0ca14d7485d722308fb1fbb4459029ca99ce72824812bac2a3a008dabab7a29437245ac5391340e561f992cac8121f4785d81378728038eba09e44395285599bde1788dc14e2e63ca625152f8e6de6aab0acd4281d32032f5c531f638d45468c7072e94075a0bb8e29dddbde15029becb9bace9364be (encrypted)
Stealth Address
344ca99fae7483cc44b2774cf65518e174458cdaef9823e25f04e17593797079
Commitment
c03ffc7b15820fba6c868b35b9e4ca9696c61c2735a3965ebe422270c2080a5d
Range Proof
672 bytes (Bulletproof)
Memo
19ff2afc60ae5880daf06949df9c4fbeabd7890d8c3c70c16d13641c54d120de6be49a6cc6dd581b20ba31fd5b1704f4f0fd06a5705fc1d939fed83cde8da2eec5d98724baf063c31662584ed77a942f5a6a908356ca298f0c8c5f32ae7a04baed82983b8f1dd1d889d94c322760dfbe6db1c16b6cfee0d8d7ede72f2287d1bc (encrypted)
Stealth Address
881456c9b02a2ad3a647fdf932598fa6cc3e27db893669ad468324c22d2aea07
Commitment
006dc95d89381c21b634a43eb66f76a54db1247f0ce08cbb5e1ac34a952ea529
Range Proof
672 bytes (Bulletproof)
Memo
21f584f27eae70e76687f9f4d3781c4585a140aa3d7b8089ba3df564b4fe9404e69b4b11c9d81557112e8b6d67587d8d1048c37b69143c7a01850965f1fd205533f59fb63e7b84e769d59423b6b0a5161e8983151fe6261c47d37ff2ce64f8985c4e442dacf74e91c75b90ff7cd8e2aac6aa26a8277c92f8660926e2b33089c3 (encrypted)