# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
f408a6dfa984f15dd05f700cce40476522f2b2bb5bd98b444994626f16760e3c
Pseudo Output
e655e6fdf434b3a98dcb2d76d0abb200e0ef6c646690555c805b744efe04da6f
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
f65b5a0ed021153211a2a181c32c3c520919939754b7a53506648442c632fc6b
Commitment
9ae04139b6bf027c4108dc2f6e888f98c215dd241153ec291054dcd7f9362d4b
Range Proof
672 bytes (Bulletproof)
Memo
29668865421b91c76cb1b883d1d0daac77c88e5a2c8fe9827265bdd7827b25ade53b2796ac14c4db2e930e8c5c3f1ad653c3d385098ea7642445358a00dcf81f723be79fe471c2565edc99511948e79bf09cd96736e4697ffe6e0a1d50409c87a60f0240e900335fa27aa6c74d654e805a733b5bfb35440b349aa48e714f56e0 (encrypted)
Stealth Address
6430abbd166d2c6ff9666d4ed4ffdefa712981017c34a9b0c24a2758f47fd920
Commitment
d2ca4069c3d914bc93f6e4fb882c79f2fdf44b4ea3c2ae5be766fad82180f81a
Range Proof
672 bytes (Bulletproof)
Memo
4fd0e83aafc4c1708eb153c0657363cae73c137b57f11b120731a9359a4c5e690b721d3171f42fbcb6e09b7b5db35a846a4de56cae2f0a2f5f5525fdbddcdb762c6e39b202303ecd302aca253b51a5d5410ec841aea0eaded8a3f3ff1e03eda4d5de746fc65ffcc4bbab9b078fcf2b66e5ee9cb42fa116d790323d3472a9f179 (encrypted)
Stealth Address
56fb8e071dfbbce96c11a930b8420e48f6022c9650d9e22e8919803a6c524c79
Commitment
246ef5123366b6f70bb7b9fcb6d58b90843cfb02c2540e13ac2ec423aec80323
Range Proof
672 bytes (Bulletproof)
Memo
b0a0a2f31617bfd0b73b7e99fc2594ae3988036b7b50a3951794da74a228b2c54b969c7b46cc1d6dc14c4e4373ce0c91e9e4d0e0368f3ee88f794ec71c9c218d436cd6e424ef3b4f67b616344f6318b31b33538a7b950da00a47aab287c81939b26244c15740dc79e7a43782c3dde9254acc09e861dcbb3541eebe2ecc293770 (encrypted)