# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
565c835e8821efd663b1fc25311aa7bca47a609d08e802ccdcf9c0796501e64f
Pseudo Output
8681a4e7dadd4af9a1980289152e894048d9dc36cfeee4cde315e8d46022ca20
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
96d0df37a8a380a8801f7b65bd54db54e11d0ccb0ee00fd6ad4e7402a2191936
Commitment
ac87c6825f347edf0ebffdd6bf559634ff4e3cae7cb08da4c5ffcf26d79e6368
Range Proof
672 bytes (Bulletproof)
Memo
c57442fd53d091f4d9958643c2d4c0d610c81349425b973f640d5f5f4f758646608729fac77caed214007d0bdd104db8dd71a2e52cb7524e7c4fdb7038dfa2d00e70b2e0d2d1c5ab3a7752f3e7c98a67210870d591855afdd88cd3936391d1c14b6f7a3edf6be88764a7c2444f8c5f8ac8fbd35a471e3e47d507939c3f5c5032 (encrypted)
Stealth Address
8af7c6a86459239281dda2ca316bee8a0ed1bab66ed5e6fb5d5f1224c4a38a70
Commitment
b86da4f1dc6c71055e9426d0c498b8c459871edb06d642ff5f45f51178d00651
Range Proof
672 bytes (Bulletproof)
Memo
394f832dd5adaf47b6dd3027c740547fc6b9aa7c77e0f756b5dc192adc8a9ead08123b713f2b66d3458ef5c2458d6b290e3a1cf451fed75368908b42380107b5c2f750cfd00c8d98500a2d3920b787a6f1ffb546af48690b01c48ba679050bd7db4166ac2b8b00804ab5e49c88dc70bb9858852d769c674e906bb419b490fb2f (encrypted)
Stealth Address
66463e06cbbeadd00613f2a3de761c7032bada1522394773d2c910ce47f21b2b
Commitment
3ead73a2cf15509ce6c568d7f00852b4ba7978603c803822a26ddbdaeca8583c
Range Proof
672 bytes (Bulletproof)
Memo
9e829f91fddd196051ffe2c0549e9c82e606d38a2e26becad5721e3627d41b760bca87099e8062bcea82638d170d0e8bf844c098b9acd9550db6c276645e14359607f782b75f0c1534241afe5461ffa3aeaf3d9ff1dd00fa0f65e5e81716db6a7f71c69ecfffb33408227b8fb90a9e057149f6b13bced1199ce5d7d028a27783 (encrypted)