# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
2665064248588c04030613328c6a1c72e4a796cd2dc29585dbc27d8f56df5460
Pseudo Output
1aa388c4a34a0235b47d7d7c49106e2064fe43f73f4e619732e27d9c5c5c3279
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
b6b656323e4321bfff49c073a8e584390df842a2070378844df3e3f713c63210
Commitment
4486b89a9521d900b9db80d07a978f1453eb6bbb850a0f6d3ead2dcb56d94b50
Range Proof
672 bytes (Bulletproof)
Memo
a4c787396892d7bfbde53573ed5fce67f75befb5fc755e3b0882c94c47d6f1ad3aea1b758fd571a025d445c70379600994f3e8fedfa15b96136c882fc02ba6d988211e29f2aca98fd38795f17e085b98d83ecadadcb8c802d07bb9317ba68849351072789e19a180333c1cc9de83e093510e0ac2dea668cd8661533147285c7d (encrypted)
Stealth Address
76fa5af228fe35a8ccc84280307687d7c495422799903bbd28db4e480f413355
Commitment
82be6227c2a2682a2f72c42b147bfdcbb3535574283144d921da85e616809123
Range Proof
672 bytes (Bulletproof)
Memo
98de0f102811d0b21762972fc50c8d45271a0192a84b56f4caa47052b45cb2fcf0a1f04d9be64c2bedc7d6dcc0d7a42b847b74336e593d8f6844cebeb20a92f78b94a0d9da896d6b749c1061622cb094a6e50db4eb4ba04a984f3fe3b0c298f6593ab02c140409a93baf54a8f93c77bf27a4ad07e62ad666662f5bc60a7d2672 (encrypted)
Stealth Address
2a902f26a0f850ec61c8b03d12e6135d6d6a23333c210a4e11072f670f774b41
Commitment
9a05891d3ae544b2c0bd60d8f0d6509f10c172104550ffa748026c34e7636c41
Range Proof
672 bytes (Bulletproof)
Memo
c1c512e544cac1096ce691638cfcee24f1ee8f83960f9e189170e3c01d44cadbf14acfc8b434dfcd6f1cd155e1ec21fc25fd09df0318b5548cfe102d05368c701866555fb96ddfd3918b098f94553de34f3b1d6374f38648b30ca7e84d8bbe6872438bc355fa75750917bed9ffbecb15ed8e3cf9046124d9a989b9bc32e72b7e (encrypted)