# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
b4b2379266022835a57df220ad5085622446a6a461feae984a1a5f544bd5fb2c
Pseudo Output
86a6423b376cf21629c6e199dc520610a0b7f66af2c4bd9f8ea300ded807c119
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
3694f9a12e85c9d694fa8b5df007a0266b62327f527f81fe4d0c99b8263ab97c
Commitment
da6077dd428d24db9c017fadf314f0107d5b2bddd15dc2929a2007a63317e77d
Range Proof
672 bytes (Bulletproof)
Memo
e2a8a565e0498e9529114be3c23ceeb4fc2bfc2c4785d9f90e9717f762f9c9add13523609033673b263e467dbcff3567563966028e0ac9ac8fdfe882fca48d1a138b515e154ab5fda0eb00efcc01509a0e625d7b9d1cc3050702c85a1e4740d66430e44c956a5d1bc23ab573393a3c40a0d5c2087337ff401f974b96ca35b2cf (encrypted)
Stealth Address
fa8d71cc9aaf71deb778b07c502c5c5f7d49e4f88d72fcd062c580c689de7138
Commitment
eccce2dfd17b8921c43b0171255099c48dc6f3b1e9b6f49e190a1c40c74fb72d
Range Proof
672 bytes (Bulletproof)
Memo
9872d363dc2326a00b4815ea4e21cbbe56aee471382adb6d04f15c7ce19c767ea11fcd47e473c3193206a6892b3b7878dffef634da7d0db0faa2e7f9a3a51ed5a796cba0cfc08e1e32f6c3459a88a00ab6f4a1b9296f6b4210b8b52545c7634e0e503a95b3623910a50c38b2248b54a0ff51af73bd7da4f29b3a31b2a9c31595 (encrypted)
Stealth Address
409ee5df2a872839a50c0fe85d1718b5549dafb78002e4852c2a28c6577d1700
Commitment
04ae2b3f388cf4a29f60267fa049a8a41b4e4f148ae23c8b5cc774ad376bf02e
Range Proof
672 bytes (Bulletproof)
Memo
e356b84cf5f6c4f004f02e9417598ac70436aa03c909abdbfdbcb95c2aa4677c015ea6ac731d99278c3012b7c745126670e35cbaef81dcba0f81d59c54955484af2c6fd4f3e7466d097f3ce1c847b07353ac3497506b5e6c307a252e19daad748ed16154b9ca939ac7743ac5dbcdcefad2edd8186fc7d1f859f1f3dcb83cefc1 (encrypted)