# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
a0593d007df86da2dd3256c6ebd9d40ed2bb9c9838ed785d3cdd330a59d8cc0a
Pseudo Output
beb4c3d60a27df68ec5b5561d5e5e34fbac0e0592ddf3b1bf3e265adbd61c047
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
121b51b3e736a3f738325665e9b902272b28a90bf551d0b5cd7236f4edca171f
Commitment
1688920b1fbd86ff1c56832d316d303167cd146d766e1f6c93f92373025b754b
Range Proof
672 bytes (Bulletproof)
Memo
d39409fcc67ef37599bea3d3d9ccd05515747922b943ba094edef2669432d21c64892b4843e271a56e7c96d74fdd1f13daf88c94b60c23ef30547345deb198bda9be71d3b7fbb75c202e4d32720d76785868a3523dd566a3f2c1c9c805c59516938e3c3b021dd50a9fcfe85de693a5dbf53ed38f447afa67e09c93e260690465 (encrypted)
Stealth Address
d41eb5b983e6f479117d5a0af2a377992592cd4941492aec09bb5724fc206872
Commitment
6acee4d029984ce425b5c59559db210dbe7a39db5ee10178a9edd05bf9c6ed1d
Range Proof
672 bytes (Bulletproof)
Memo
de9c7a2b925128b10bfb6f8e47e8fa5e31ccdfa9a452c301e2015269336202a3b7b2652a8344436b29091305829999e3ab28cbe9689a797a75a5bfdf26a0b3891303f6787e325fa823c88fc55fc303d2a9c3ffc42ed0a817831f6ae2cc949b6a4743061c107a7e66234f22fc3c3bdfba509d38eb80f6e53c37fd50c4ba514942 (encrypted)
Stealth Address
0e462f3642fb6d5e07c3de9bcf5e9ba388dba162ec288687604c6b31323b5a24
Commitment
8c55d1fe63e67416b574268924424bdf4565de041a6e59e0404d09d86dfe571a
Range Proof
672 bytes (Bulletproof)
Memo
b33b2f5a03394c6b9222774c3a9ef7ee76e8f5c9b3fa9a8ec8c7d311b8b5b6a772370c372955d80763081b1a736482df510b134a0a31217df12951db8f86a5abd430820c63873352e313ce601f1dd5b745caafaf6cc0169c5e29547d39e261f160f1c57c8eb3e406ef40abcba8f443987df4ab440e3a11c1e2237c8dff8ad6da (encrypted)