# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
7636ff34f0c01c2c7c09dd17c0fc8101196067a41236e53fd8b8072bd26b0c7e
Pseudo Output
16b5ebe43467143ec611c8f37fd5b70cbf302cca8c6e42217bb5875ead65d829
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
b404582466dda1418d2dc7ef099e426f14f3bef88d218d55e813c4a81955a144
Commitment
5a46b6e2a33f8f7fc46d7db0e47bd8ca9eed8a860be1c197a7e11fb015bce522
Range Proof
672 bytes (Bulletproof)
Memo
da3be59f1da2e5f9db1d64b7ae48f0d4b3e3861af3af9f8497a91483214d4d2d0836a1b84a8f64b6de6a0c2d891d00ee9208a22705ac0cf82a6346436cfc18ce84ca301f23d88693789e1257e784dbab453090fb81c01637b104fe97a57fb91bc2db35605392b0cd31fd6d03497d07a66a2b9d4fdd3c447750c161f35bce1838 (encrypted)
Stealth Address
5a69fda3fae875ea6207b19805e02a999429a480a6b0378c8e12fefb5e89bb13
Commitment
10dcf69b09a27fc79795a5c3e4b4ff3a4f2d94bdbb932181071723addafa4930
Range Proof
672 bytes (Bulletproof)
Memo
1d62f580976191247ca2fc2a97672bee8068944135d6ea7fbcc86618618e7ac8f237f607458dd216d9a618101ffa00d316c320731d770071c2bd0ac07d37dd6b3d0e15270dc41959364c9b0368747eb8c79fee64663648c7f91ef035f739892078ab894f1686368faa1def0006557c90edc8976800196ac49c724447c0ef3761 (encrypted)
Stealth Address
feb969ddcc48ffb3c2100e976a774f8c4155fc2d7294856f4343da3aafbb287a
Commitment
82a5e5bb8c83ecaec6f50a3971abd7f0a3fd2689ce424fa89ff33bfbdc7d3235
Range Proof
672 bytes (Bulletproof)
Memo
66708b2774d60af694d9359e613311ab43f87112db9d6c1a9189da3adf95fc89d40d992959c2036aad91bc0553539d6d29cb7250de38b39ea6dabe79445e410dbe91900bc669f7271620461366878e352ceb982c6ff0dbb308715138e7487bff7e543f5b24bd910cb8da6daefe619356e285eb749e819e36e35b933f50e59d14 (encrypted)