# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
8263c5ad56eacdcdfcbee65e01468aad57ce34fdb5fe42fc22490a1cd4c64e1e
Pseudo Output
06b5ea9015c390e8b05ec92e9f57f11da77552a62bf38e1d37a4e4e08393e712
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
d045d4a642943e0406c856f660176555bea76af576300889c25421574aca303b
Commitment
188bdc9f88f1b6804a1bf7ae2114abfa68509a07ae3238c58436fb8c0772b229
Range Proof
672 bytes (Bulletproof)
Memo
8264602f4d6f3a2ae754f677cc925714c9b68a3fd5e673fc484bb23496c4ec96ee79527d2a4c5f75d5e5766c92d6ed2fc5fc4ed7333e921af460590e7193ba1bb73145c2737fdcdd628ef640c0f0e793e2ebac1ffb810b601303f50bfa7490ca2aff669d453a9e944b52754e18ffcdd1902906fa53ba5b8d7084eec18151d8d7 (encrypted)
Stealth Address
cc176fe151a07351ba62f7d6b5b319e32593490c1900f4bbc530de0018fa1549
Commitment
8c27f99476e4cc6c6ac5e16d580038dfc927c6bb18bd065fcc1e4e905f87a719
Range Proof
672 bytes (Bulletproof)
Memo
d922dd01b8bd630e9483047b0cba9c6faec5c9253c6f84475ea705629f53d9e8c0efcbfd9a366faafa2e2fe386530ddb07341abd00dd15a3931bb2e4c6c30337c723aa605e05059bd15a1502c84f98847d46a22b0b6b7a46d96af114fe8245ff6d24f5985e4d0318cdcd9503b83b389b2cec032289f2c542e9bfcf2a4bea0c3d (encrypted)
Stealth Address
ea95464cf7687fe905ceb802527e1d138083ab32d0b0cd7c0c73fca90226235b
Commitment
40d62e882dc65183250a7585a4771e1a25cd384875b29d72eb479a159bdd612a
Range Proof
672 bytes (Bulletproof)
Memo
138697d437f673dbc7cdfec35497d52a5ad24cbbabaca42b0a835bd922c9afd56a53830e348247edeb7d95d1d6d8ee7198ef8e0fa8b19d77fc6550ec37120ee46403c27451551eab5c4cc2fa81b31e3b017f8f920465a3dd1a3e3e9dedca9ba46853f98d35abdc183076e4fc2f525c85e92c04914cc9918e855e0927bd3b5a9a (encrypted)