# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
fe31e48b54c79e9ee25937e08181a5e3b5cc05913437ec15985629f0ac6ee952
Pseudo Output
be6b3afbc852af0522b93321a259168e2b696177aee62f1a98b1cb10ab8fdd34
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
c4230c801ef853223231a655e9363845bb89b12fdee43d739dd9e1ace7c6ad47
Commitment
6c2fdba9192663163cae9c368cee8974ee2a93089cdeb86546d3521d2ccdf432
Range Proof
672 bytes (Bulletproof)
Memo
3bff1db1191d7852df81df91ed931c319234e32937d38f00c4e8594dba5112573e8f6fef61842755c5808f3261ca13d9ce3624adf286d76069fdfc15f2d0143da17ec6fa914efe3563d2f031a9b77f60c750a62a3b85f0525d6260063382b1b2474648a6e50831abc900c59fea7b591125ec5c851b057cb98637113f2b476c4c (encrypted)
Stealth Address
b0b4d8809c6d55f266b24c9c33866ce0dc93063c1d5af4afc267d48d5b4fcc03
Commitment
4898e768f550a69b8ca83767cb757ad2bd86b4a60088d4182164a14bb829874e
Range Proof
672 bytes (Bulletproof)
Memo
54b347b4f83f8ca97a0a34b90bee68ef1bc13d9b4f4f552c4ade40adeeda1d2ba68a39b103fb09dc6a297823e2e1d0a41fe6b5eb3b13ae711385c03f916afcfa07a20b23361658c03061b6d32a99f2a261c5bfb0b6a07f1d3ed55f55283aa71d7514f68a87bdc686b5dd3384379c7f66389c83216a60c700c805026084ebd60c (encrypted)
Stealth Address
d06421549f9963c5483df636acf7fa17fe213e16c707c07715dd3f322486b512
Commitment
7eb3d17dced91fc5504173043dca760fafc229f8a374708dc43343de9c79d358
Range Proof
672 bytes (Bulletproof)
Memo
a38c7a522c75f7f599c1a22d6286446742540e94ee76061116030e6274c51b5dfed4141b21e984ef1e5b7322b6f54af4e4577718c903720dafec85e5a7e5afb70bfb99d10ac494ead58164be6d599c2bff8a032a278beabb0773197c2e6665faf3f52055fd6538010f965e731a996fdc6ad74329913dd310e5a381f5ddc513ae (encrypted)