# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
d6ce8e80105b505577194b61508605fa16bc5a9025333403e552dcb9f0dbd13e
Pseudo Output
108981951be13ac6853765f70864c659a891332c1392890c91afc8ebfecaf860
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
94dd6db44cf657c36ea80cf8292e5078989f0803d5436b42b26a9228c0409c3b
Commitment
b604a033066ea07aa8ce72ccca15d6d2d4bbdceac0e36a44842cb5c1a03f4135
Range Proof
672 bytes (Bulletproof)
Memo
f2189a2a648bae914bbe900c5e22df0baf58ec733fdfe8e0afc9817ed1fa9ad434190570cca7172042b7f16438921767497085a20d2906e302e5e5ee548886799239df94935c9fde9cf1e1173273ce0ddcaf62be589a03f2f5ede2abcb5c9fc7d576ae204010bb52bd1c5428c0b75c331293babc3e116e406113c2322324c2b6 (encrypted)
Stealth Address
4e882eae48deda4bcf77d80f94717c952d8a15eafd8aa935154459a9662d971e
Commitment
30251cb35c357c46f4fabf28ced6f2e232a6743ac4e1c0bf3582bfad3b89d202
Range Proof
672 bytes (Bulletproof)
Memo
c6fbfdc2425e76d4b3eca64dbc04a8903f093866e3fcb32375143505d72c4491b47b00323bf426acb660584ca67d802fbeedbac24a452d99be1567552d494c3192558efc4936db317ae66e3135ca3d1dbf98e801560d516e92bb60b011dde453f5a7257e617a3f20350a5ce78040186c3655ce02805fe36a684582f0bfbd9f15 (encrypted)
Stealth Address
0035064aadef441dda4e6a4b5a7daad5260d78a5ef14e5018c006131d30ad317
Commitment
361c5bfa5a1f622fea25d17f2da5755b581d6e77dcb8a87f895a101f08a27d24
Range Proof
672 bytes (Bulletproof)
Memo
4d7ed4881fdde4623862d895ca5881c927e07ce2535244fb559e07596ecec2495c93af47493a519dd0a1be7823904c7d286539d52c274cabc0598f01e1b951a211c520a6243d2ac5725fda5295524f096b4d95c535af4426146b1f8ddd020f246d798e35577861488c7ae890398675d95bf614721bcaa81c79bb977fd0e51dcc (encrypted)