# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
bee863621d26055641cd2d06820b9283b8a287b1f230a51e7575518d5a4c1665
Pseudo Output
d601c9fa25d7d43174ce85ed4ad53a6e269bb8a0b2dee48dc9cdbddb99a07e6e
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
d62d32837d7f8330ff2721bcc6c3c4d3d025db219c98a0bdcf00b4aff66dc646
Commitment
b6d44b21d7908ee22f0839c1d5607d05cad930d65e2d5fdeda00ef83a9dee06f
Range Proof
672 bytes (Bulletproof)
Memo
2e9d164b418c5cb0b5e9e06137a88455396404f7dc51502449e3102b890f596689199652478d23b01794fad592348cbffe73976c70c8f75599f00099a64496b467e43eb2712bffbf002319f473a47ca142ecd9fad9e4075fe5eec7e17a66bbae92e2d1fd02fe7baae77061702834988d2e368ed9347c2748ce99fca651c1cba4 (encrypted)
Stealth Address
fe03f4a204ba8fe294913f24f0a4a8573669243dd51e9602d7222405308ef935
Commitment
08a87f533db32a90f42ae78df0406f6aed6f239149e533d90f20241408e9ab77
Range Proof
672 bytes (Bulletproof)
Memo
ecc1c04c810d12e5bbc4c0caa3116ac506c1948e45600f64bf67b2d30473afb9755c66b101dd6bb6c4150fc468be7fb6007e454e8e2408713065cf3337fe7098dbc6a1c63c651d5321715df7c1b7fbbcf33870ce8f4eefcdba29dd6f504fa460f5b878a4c6491c0c687a178e91d9bed016d7ea3417e1d364be51f7e9cdeec640 (encrypted)
Stealth Address
82e105eb606f9fa7d112d09c706fd7cdaae758435d35b2326559906219da9b42
Commitment
d0c8ce3b5688f702f6804458610e8d08da674a3c45a310111fc1bc3f3a82720e
Range Proof
672 bytes (Bulletproof)
Memo
53a58b50329c7c120e9efb1dd5649170aab55b04135ea3a49177545142b1d75d8b1fdaf156a085b6b01ac0e644f7ae3eba04ca4957dfdfed60fd26a5150782c7526d90cbe911ff914d5edc2932d9fece9f463e28a3512f9a419f6127a71dbb195856870c3cc62629b1caa8db41a4d2085a95a2b1764383fab9c5a49d07a9870f (encrypted)