# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
823e4da2d34685aa75928d688a1538bbb8fb3332a721e631f339bdf958c1f435
Pseudo Output
a02095986c4fa261a563d03afbe00a90c91a408893c2fcbe257a52d42f8bf236
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
d03758e62ef3ba4924b6d15e30cb70f905b516dd34b5c81eb0bf7ec533fe7939
Commitment
261b0757abc77f871c14efa2666eda7dc5f9f6ba2563f91aa0d6cbe428155159
Range Proof
672 bytes (Bulletproof)
Memo
75db8585b6eadf4a828e07a79c5e45e86539f0ba60a29fe21f2c9d36387b154abc8a21d7363d89a34365765a67387d7d8100c6fb4d5c175fefd4eccc34c35c422ff71c83a84a877f12c0a52e12f731735853021250a1063ffbb6ace499362d819b105661c02e4a170a4b2acb33548c3398e587d1979076b3c2a1e9f3f502eab2 (encrypted)
Stealth Address
649ea1d462ee3c218959764c498481a61703ec9704a4ec2620d7d8ffea8bf923
Commitment
30e38cabf59b0b29520ae16a0399c23ad7db2d2584822d60f34c073707c89459
Range Proof
672 bytes (Bulletproof)
Memo
d2a4c504c374e7fcff22a102c53043a3768330194cd2ac46c7405f556d2f67dd12947573d92f8bb0cadbc085d0bee42f498bd9e54f9e2894ba1b53787a4ce5d5a890fd13d2981e2129447824b5f91c74a781ae36d69437417be45148f4105ddaee47008de25db9a92c2e3429e286128a74a41ad4973e241a2c3dfcc71f22adc1 (encrypted)
Stealth Address
ba90281849568c62f50a92cf75a06fd85fad6b9d0c5a258159e5953eb0da3f0e
Commitment
c0b5f541522afa17ec72bb16974b017da3a427526f41ef198a3d270c6944e23f
Range Proof
672 bytes (Bulletproof)
Memo
6dcb5a175a81c57745b24b05e8d21e58005347fe59ad940c11e694477df43cc41106f8d042871c41cbb8aa46c77c33136f41b5b64bbd77c1bf4882591c950e0494499c848b1d4cb336e75399b0a273de225d1734bb9bcfa2f7d7ea4b0e9a4f9b25adada953828cb23972d48f395a2aa65c63391e23c755d5a3148e1cf437188f (encrypted)