# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
b4e76f62dd032ab65c0335d66870dd16f348690343261595cc11ddbd06168921
Pseudo Output
d0d6d7dca9dd785c802452da9edc5d39c43c37aa88fdafbf6cb865a2c4661c51
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
321e3591b252ee9e21312e58a264957b2dcf78a24d118b2510ac5012d0eae77d
Commitment
78521c12d9446bb6b16230ea306a37efdc074c1ce7840546d0711adae7f31d00
Range Proof
672 bytes (Bulletproof)
Memo
e60cbf993db1e7682780939f43c45cbf2f6cf6385a4108e42412581791e41a19369ee071e52ae809e97442b59a44b5a5067a91ec4e8e59888626fb12612897c79a189342a4ec918700f4095d3f2d1bfb8978b4f8955503299a810fc8e7b306bd1e24c6d36d8373cc027cd18fc763c918c505bc51154a83f4173d2369455c632d (encrypted)
Stealth Address
0a48e3570ecf1d905430b62eaf089ea321b5a9aa9fabd5c6b16ee6de1e84f626
Commitment
607d4175cee25751f9a0562126fb761e5778f5d6282a713f9ef2f682cf1a1b21
Range Proof
672 bytes (Bulletproof)
Memo
1f3ef3a99d1c3e146e4e52bc0886beada6ec50338b0191b58781a9ea904a0f818dabfc04e7f4f672e54df4170ea3191f225fa0d2add31ebbc91bdb400c9046cf8ba771dfabe315460bc5107f31a719531bc05f2e71d9c2eaab03d2fcab225983f18d350143a3b56b89bd47710addd6b58e717f3c57792c0f63e09db185513cb3 (encrypted)
Stealth Address
fcc9e7f025cb14f6738ef9036459ca008bbe8c25932f1c8e3cb81dc8738bee12
Commitment
4e1cf741629315f89a8ceaaad3afd8a9cc4d4ca6a482e3e6948601dddb32ac5b
Range Proof
672 bytes (Bulletproof)
Memo
8a968616429b1ba13e5b1e9fbc5873c721c5523c04d5b0c9a76c5706560fb0c3ce154291378098527301b29476c8e4bfe88bbd865f65cb7cefbf64766b22ff6688fd8ca0e12210ee06c32b5081e7349b6246de383653c54db4126509919d7a732bc200f7abd74d22750d03c279b32b947e7046932f690a0e8f51cbbd4e23aae5 (encrypted)