# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
66e16622439b24ed83c3b784a18d1f255a04202d9e5b304828284dee420e3f68
Pseudo Output
2c6a3f3d5b94d4f7a552697b2bb2caaf6fd8239008662a4b567371f15484197b
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
947b903e4f9c46ceff6af10b007d8f00be947f560a8956e2292eb770ceba7f53
Commitment
d4934e356176278e249e0e43b55177b2c41dfa4f197ccd8df8721c667a53af71
Range Proof
672 bytes (Bulletproof)
Memo
b62c5a53e475ebfc05205af8614d23aeb8bc0e5f775d9653e66174bbd3cc885474ed8b6d294262c34ef585c4d808951246434b40ae3fb62b7b70af0c24ae891d0179179e1af72ea59aa61e4bdde2189a5cf8fb4d53ea1c9ebe50a5d23155312a7723d0b72bb4aef32afc23deb50efc724120f352fadf61f4c55d6ad4e42e8669 (encrypted)
Stealth Address
a4ea8a09b388e458f9b74f822316a2e8e79523265b9d42606a2b1aeeccf72569
Commitment
6087598b7f904f8e284f0f4d08ec2f8c4dbc341f3ee6b91925e773fc32861807
Range Proof
672 bytes (Bulletproof)
Memo
17fc0f2baec9b4b7bb2fd9ee2f9d53160d263a0d8e3adf694bac7e26fef98a94f322de117b16a07e4a0a0e514d36a1beca588958e19ee58afdb9d505d0c7973ab8830032c14e3e7e286414cd649df4e665edc3afe61f76813c2748ea616c42ab12352746212409eaa8699619ff90197932d4d4f584cf25b1b86076859d5cbb0c (encrypted)
Stealth Address
58e242fab79467f63674548af4e1607a2c9b7c2b21136440ced6aff62da47e4d
Commitment
5c6ba5d259aae8ee0c5a1fafb4cfb7e6fc5d6c5dd408dbc8d59db15e2327902f
Range Proof
672 bytes (Bulletproof)
Memo
3b622fb93b530699933c9fb4861306130779180d12e4cd4429d72e33e9f94387801c4b52f1d6f2a602a36a86a4ac40b0508914c6a9b40969a64476a9f1d7d6f28ea51dda55cd49e5558c7166cdf9ace5258e5bc3fd700e963c5961463ea34cd7ef2b2d0d8f1d91422ebd6fe44553aba969e6b8a47d5d8fbc5847c9348c4d16ee (encrypted)