# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
6685e90fc29bd9f69f9d413112a3129bc96beaa0ac20f46362eb826ecba9e457
Pseudo Output
a6d1c4fd556c86d0a055201f490c9babe4fbaf740cda0d21851c8a55df80a962
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
d4f8c0208d1968361d121b419a00a7ce118fc4963f3249b2a4633af81784203d
Commitment
38223450fca82fb88dae0d0222784f32e5c66ff122a046c984e02fe557c93648
Range Proof
672 bytes (Bulletproof)
Memo
502d6469a4e3a83a9c4cdd74270e1d35fc696e00bd1161c1273aad56b0ad21dc2335eba6f177ebb4442f646ac020c9ec5927b96f3424d831a8ba28b31d508390e3e12fe6e374c2f1cd0b2edbac11ea6bb498f62120e1247242ec56222251746a829167ede58d1d7f192b4e3e1e7eaeeb733fcdbe6156af180092ac2756ca02d3 (encrypted)
Stealth Address
36b3d6fcdda2b71eb5cec3de3715ccc774cb8de75ead05f3679cf2f8f15d9c67
Commitment
2c91e21cb5f4dd8b8bd71849a3d3b4bda0fce83787ad5f48c94c414393435908
Range Proof
672 bytes (Bulletproof)
Memo
4671fd3f696ca3afc4c61aa1106c8c68cdb4135e6f488989babddd28fa9b54ab3d93fdadc2fbe6e80df0f8689c3525243c765d1383059e94beef6ebb44cc9844d45d938e1ef1fadf5d7f39c6a64675443d6dfeadc9700bd86acdcd92f9225da08f0489fe0ec9f4e0aebf42622b036bd29d5bfd6d102185c427817b9a15b74058 (encrypted)
Stealth Address
2085270bccb543cd2e237bfeb49970d942452ba1f5d879ea99f3f762d4ea6118
Commitment
483b347b02d604c06905127d51828375487929078947950f41f3e88c64e57d29
Range Proof
672 bytes (Bulletproof)
Memo
fa0938838ddc56aa35c93348a2404e82bbf067544fecc5203ed69d444f455e9700078612873e540a836f714ab399cf61d51f8e3d9f41b6f5f5ba0c0e354b03f7ee5df0723de54f9b7f4bebabbd62d93169ead592aad3798dfabba288705e35a4ad400b2de7472c94d124c6b74c723d43bc8a0de57e57924562243ab36fc4b2a9 (encrypted)