# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
664025db72a6cdfd22949a40723f546c9ef0ffbb6a031820f624de4fa4daf02b
Pseudo Output
42bbf38ed96779a855bf46db28c671f4f09c8abcf5d757b83520d2ba99f4441c
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
0e148e950ea304c8583e88c0dafdbc02598f9ca17bd8159615637743b277b01a
Commitment
9260bbcd30d233a2268763397c02d4cdacbc67ec3ee61e15cb0543933be65066
Range Proof
672 bytes (Bulletproof)
Memo
92ff073dd0feae9aaa8f8000a99337caca8b8d48d643111206a26b0a7464218962f48ead9720dd0796e6748ad9f6419bcfecb921fb6df2e5a8d18a871c10d7475877451356d5def21d8a6028150e3085828c78c0621b1692fe55dfb6c945c41123cf7bab1feb5035175a95629abf6baec310ca6b64f9b4f83b63659a714b8fdb (encrypted)
Stealth Address
e697814ca096f167e84b38647cda6010486a5b299d92aec97d8a06749bf38a24
Commitment
72fa16600c3220422db0113bede97b93c976af67d4b3e40f1320ce3c4ba03160
Range Proof
672 bytes (Bulletproof)
Memo
52e9721bd6e89684b99a75a0b9a4ae66f1ddb857ced7e813c5997c221ca108c203a0927becca72c9a4bec3d2111b644e3f7b29bcbee91da195f0b0669710fe5d4b6534d443ba84711fcf0c1e3dc1389665de6755a7374e32ca62f3d958f71a125881a01909a64993eb331a613961f967f730da47e4c9de99040fa6fc2b063e9e (encrypted)
Stealth Address
5ab194d076b48a4c253355109cedf28a67f4c9a3dbc4ddc99d056416720d3c01
Commitment
e68735987eca7738c36687fb9b0a7f1166fcfae0555d8b07a677a2a01d71fb24
Range Proof
672 bytes (Bulletproof)
Memo
52a0aaab281308b2580b1ffd00028a8e5bccb230a6b0ad754652b51135169b3c3cfda0ffba76a4d99a63f6f3b0c38a3f789fe677b7168d98e5e1fb1d0ae4869d00ef8ecea1383f5e050af7bca8b0d5307990e54eb0e975d34504ef75d2e04ec908ed92e2efe3514740a8ecd779ebe63deb734bd0d5df73eac446ed17fab11b02 (encrypted)