# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
681f4401d9fcb62c217fdf458ee89443ab18b9eec9ac54e7726d1771fe45ee5e
Pseudo Output
a4a97ad81e0ecf7a4b9f9b96f0dc35626df7790b483054363d1c651e1cc7312a
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
d853b99b337d0d030594222e15326cfca8221181b8524203cc03e34892191a16
Commitment
d642c6339d2f7ca00413e42bd60172d658cdd3c91631e4c6884a2082654d2b5a
Range Proof
672 bytes (Bulletproof)
Memo
5f0ac384dc4b0d854dfc7d65ce623ab7f4c42920f947347222886bdf19d1e97d33a25929dbe11b1004d2a24245091f1c083025eabfb900755f54c31294c12eda31173ccd2092c3467365cab24c5b5cd78e3152180365437f5fe48c0b38f11ec543a2457ab5a6a90c8fc466f2c2500553f46cebfcb0514c1ff3ddfab786d76314 (encrypted)
Stealth Address
92ecba79600eae45975e7adf40c29d6c48b8d95c1fbbf8e52f5a44114d8db924
Commitment
76d84dc75dbca17423fb62c4bc2bba8685f589eb2ea068335407785fbd5fb115
Range Proof
672 bytes (Bulletproof)
Memo
e2ac7fe713bafa47b4366a4d791a52975397a4c4f67190cd478c88f6fb0309f4ba465b400f67263502589143979956fae851cd6e082a4746100ce514b9530e59d5f97647ec6effa5ef68d2492c2d21ee9062c96a272e30407f616d2c2376406f37fee2c61b9c134211e03d080dff898307815fbfcd840b45cd7ea1dcb8a23f70 (encrypted)
Stealth Address
80f35b7c6905f4e3c12c5254673bce27020840b7a0574eea433c8535abe1a63e
Commitment
ec5b076725bea4a147ee6b150980482171a91136c512477ec0b6ecd628c7171a
Range Proof
672 bytes (Bulletproof)
Memo
8da4c9d17fe4d62e58f31a22f0447cec68f94cd5f399eed371c4183f3232b71e5b0935a4ca540202e0fc29dc892487e1e204c0873909f94511596851b7fa86e70765dd0837df0904118a04777b181190910443cd54252b12d8c26dfe74f2a651cbeec6ed5d2cf01294fbe290f108ee89f96d576cc6cf72516c645a04ade61218 (encrypted)