# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
0074df64d2312b1311b37c2caa47f847258ddedbb60ac310c633cb15ee63d647
Pseudo Output
3e9751ff60cb6ac28d995e6587d0fcce1a8e862f30ed745c524205ba4c49fc44
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
d2c37726a9b587e73e0d9ab4d39d5f16976acb2fff32a4eaecb513aea1d95437
Commitment
b4ef8fa6bab8be5e1b95790d19cc4573a38412ccd97e89de97f3dfd7687f272e
Range Proof
672 bytes (Bulletproof)
Memo
6342a481b22d099e91e0be4fdf31a6b09930eea5a45ea32f999798e6caaef70d7c80a3013ef79e2c8425306f77ff8c45ffe9b128906fedd9a376454662d062d139f068bb6293fe0cb095e0f37e150e73951162791f4cc7684701f5e7cc5ac6d42e52fb49779412edbabae1d713e544d34118c23693d0325cbb366839b42da994 (encrypted)
Stealth Address
48e01cfd9b5f6ec32c1dfb3369835a39f8116552993f49c074fb5501e9adc973
Commitment
945295b5079a9b775e9647a2a08b6491068733f1517332afbaa0c5093a80f659
Range Proof
672 bytes (Bulletproof)
Memo
02cc537a83d1339a8a35da5b339ee9eaf76f0420139b6071226bfb0cfaf4e514c5628879e25f0cd49642ad0710de0083adbb66ec45f5cc043593d200176797a0bb668b1e2f534a684281709f3a45d0c05df3f037023b5618d866f3c9ff1798d94a333056c8ce2815eaa2ba6fbb14b88f0750521d91d97449e36d3abcf07b7cbf (encrypted)
Stealth Address
02979d844dc18a7a3a1fa214cc56656ce070d0ba45699cca519aaceb6b22a029
Commitment
12f2b6c9c829ebf7c02abb03cdb8c2a8ae92e9f941421e1070bb435b54c1b358
Range Proof
672 bytes (Bulletproof)
Memo
f61738808d9b8a8a283b00e233c0a03c7fb3ec789a036b048654e7157369352e5cda4799fda0c80249dba28bb919e2ba959955f1c2afac8c957d9a41f37154c683abb7de84b0c2c084152ae3307e7344af2f9732c9c175c1d3f8aeb772a107b1905bc200927e0d8da8423435fba56bf4150a37b15f8496c9c0cf9565f240d35d (encrypted)