# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
d672a8c08995e47ec8ca327adb3f34ae588ed098bfc0f9fa440389df4005e456
Pseudo Output
843bf0c4113ec058be9f7b4f3fcac3465bd3c1bd7eff632301eff23710324663
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
9a7a701355a63638cfbec5a19afd5843f87ef20eec3cf9dfef7fe0739b194a6d
Commitment
94c390a0c348356b39c4e679626f2c0abca3d08a1d8acb818c50d5e9eb63f506
Range Proof
672 bytes (Bulletproof)
Memo
dba82ed114e07da62a079dc6dbd21739f94122e240503d29cc28b70148b4185b3fece366932d735356302dc07d1ea53043fd93faa30a0cddc3c15a125f9240d26a0a99a05f5ef27ce0fbddecda16cc44f16177c30becc22f8fc3e4f7127dee2561756b35165a6fd2fa0844f5b9c4e7c7a8cc15c33305e40cd0cbe6d53486c564 (encrypted)
Stealth Address
d256e27dd3f15292c3d71252fa58f9907e918ff2c7b2c60bf3765d5484deca6b
Commitment
562d56068011915e0046a465af784abdf91cb85e14660b00e1f9b756d972943a
Range Proof
672 bytes (Bulletproof)
Memo
d41f71b39667db01b4d5b509d5034bd7b646031d03baa9e8c7e7df23859ee8b4c6c1c1efb5b42ce493f72d6192ae580f43b4a2f65c21da731e86fdd50db083c079e879878cc3c3e2f3c3c8d79737c948dd0e7240ee348a4b5d4ecaa520a374ddcc637cd58ecf8ecdbd5c5977bf63a7c04d27fc43500bffb9897866644452fcf6 (encrypted)
Stealth Address
f230ca3a97f2be4843c36dd7b0f08217c11afa2a0c87be8bd7849f2c29d60e59
Commitment
42e6cb8085976151327085942a71d1968ebf9224579ba2b61f48c2534a7e7f7f
Range Proof
672 bytes (Bulletproof)
Memo
27f8d8283d7b9566630859fa40f3d275eb3c4d0034799eccefc29045a0b38eb7783fc445097269b2bf66495a47b656933d43c2d4f79eacd0d99c629984e7701bd2c83ce9be40dd49ec49b4de3a8ec539568af08455b5e6e41a97af8523c405b5362933042478cb3a56f8c438bd4cc35e8b4a9a867ee30bd0bb2f8c1287939edc (encrypted)