# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
54f5e7a0e5454b10fb73daa8673396e2f4b12173c86c4d53ec9349b556580b5e
Pseudo Output
c8bff3b0ffc8ec32ff50cdc597a57ad536fd494a285bcff8a5920af6eee9a130
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
44619461b5c474ca573a2a8a75e708c6a050c5fb24ca92ad62d30e932a654848
Commitment
c4c3420fdbe9f8bb92daf771098015cbd94685d8fe1cf745f366b1c7fa7a297e
Range Proof
672 bytes (Bulletproof)
Memo
fe64a38735e2f9775f0ea24571daa6264865f291e2bd0c023e909675218e743034e068c8c74981594b0430920163eb1cf60a1c9420a4c89338213c541ea49219d879b2b7c42d98cd2cbe752bd2a4730d25063e965b383ed0cac347b082eb4e4513912364b5260b66535fdc08151f462380e46e4a155a001586d5b7a0e6c91f43 (encrypted)
Stealth Address
80d16ee4dfc666c7a3c608055403234f82a050586c341592d05acd4e2fa25771
Commitment
00d72895cb041e104d922ea4c09a65bc7507433951c02dcbd3051a8dff978b18
Range Proof
672 bytes (Bulletproof)
Memo
94bd74e446fc025404714862b818e54a6e8ae84d912ed6507b5a219528aff93c664379a40d4459b1da3d175c7ba10f6f6824be2e2d1e28354a939cd8f16367caf6e4add9361196a7fa5e04df00f681a908d7bfe90df840c2a7615ccc3a3ed67d196341b46e5146dad5143e9ccfd61bf78e276959b38f21db3e02e130bc518e58 (encrypted)
Stealth Address
f0f91fed67d0bc44e86745d6f3fd455cca5f1a064e238b06537419769926f351
Commitment
368f8044a881813597d6e679f2c091bc15fa5332721b7d7ca32a80dbd10e2151
Range Proof
672 bytes (Bulletproof)
Memo
342c6822d8492869c45bdbac45792730ffafd2d4811b51ea35fce753f1a031a6274c78c8460dea801d3dce803ee7d11fd4baa09f5fd082534c503f057c229bca162f10a67fc466892b888bb251a1b29f8b19ce21877fa4f15e7da19aabd578bba9ced738177ea2c4e556eda4a169b6eebe0d1a533bc82c3387acd5d121475d27 (encrypted)