# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
e646913fcccf3b82cc9121941d0c3a058e945bd66470357d42199ffb9101471a
Pseudo Output
bc36c06b4fc5fe96411ba48ca9e383d0c56425e2b2c7b7e6b9ede0d2ef1a0d0d
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
640d31504f77179bdcdec5b09607d44b789ca9ebcceebaa0b42c97283ee89630
Commitment
3e9f701dfc60f4dfb8156b324a66482863c17816127ceb05505020eb5eeb2273
Range Proof
672 bytes (Bulletproof)
Memo
cbfb8e3e5f4c6b40399e87cccdf2888d17e34d4b01f5618c49a04a06a36d5857050ef1d25dcd066065691e87701bb8aed264387aba0cbf045cd6faa736a77b515d4a69bd35929a2c80092ce342d99d4b19c70257674a4b02ad145f7fed23d7fbdb8e5957e9dfb9f79e2ab9b5f945c1504c2c309c658fb30bbfb586a45489e626 (encrypted)
Stealth Address
44d5b50a265a75e2debc10cfb5a3e7532c86e3956cdde30507f51d883d8de632
Commitment
705e4af74a7cb81c9274fe07748140e892d89142fc531d6a585661d5bf8fa736
Range Proof
672 bytes (Bulletproof)
Memo
0b11a9b6646fc15189c7eb48a40204eaab5577f6586017c56ad9cc2ff7246084d1bd6145c989e63669ee2a3bb00c8a7b39aa944221f281b4e4a3a00cbd63e827c9d25dca7f85e15a24768e1f1c503117346e0467707828b439d0355c2ea124e5264d24fc7221d5bf29b45785daabfd37d24f9f47ff6ba8a85806d7188d22e481 (encrypted)
Stealth Address
b0e242305dcd75b019c2273ef3a40297df062933140cd0ec34d85f0e952c7673
Commitment
34a0625ffafbc63e94fe29ae84c7b4121001ae6a33d5dc2aaf63c36b9bdacf01
Range Proof
672 bytes (Bulletproof)
Memo
ecedec5159104c5deb82e85b2da65670e784d64cbd57132094554746c680b7ac0520b0495050431dc2a6b1edf7b4df93eaf9bc541f40b947a6bea79580f13ee398e8f7c22054fe9c278d9dedd449de1319644c6fdda81b704d6cd6bf58b5efa4b07d68f9a484da4f92d5664f97a184d26d1235b3de30ba86f3a3ef87a4ada78d (encrypted)