# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
6647a51a6437e6fa2e62728828b57e4f21fd26b56cb8574a802575c3af4f5026
Pseudo Output
4e73c036e72ffd81ff39e4e9915a1d96f10196f27f910ccd5ce1f41af5f4b941
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
f04f92f0f6a22d111ab4c202ed216db150a92e001fe38e35606e8629f836fd07
Commitment
162ff8d1452ab270859d93ff34a7057edaee081fb5e49f52b3faf75c95825605
Range Proof
672 bytes (Bulletproof)
Memo
d9212ee3b65fa288c144034055f02f09314172e0b001520cd2657277de239b6baf608ff84c56593d16cfda2228f37ca2adc41812c7db365768d139468f43512c0e07a9e4f76734c08c1a6d9e4360a1f7c3000b2277eb68ec354626f1c69c3f4cff8ba70b4e92281f6cc594b88fc49ce43c2424f44ce68a7d95fc1fe541ecaaff (encrypted)
Stealth Address
7e13890b734cce5ae2f4692c1f896dcd95baa337e4ce44c957f3b9d5c4072c12
Commitment
fefa43d1335c2d2591f4de4bc010d3ff7da41d264ee29d2c9a387a7476438971
Range Proof
672 bytes (Bulletproof)
Memo
f50d9f64d34eaca1b7b99a505755cbafc37d5f5f2b5b7a465759d22a16667ba2493398a9cbf5dc24765a800b0c85c75708255d5e92a0aa30d5fc99947df1619ad8b811ea0ba0b9dfdaaa8a96d323f18c0785b79878e4756eea82baf2b8bbe7ec922b35b478e37c7c0a334f8eb74dea426e432387102a6b07e9c99b7b4c881bc4 (encrypted)
Stealth Address
9a34e648c12bd24393267000483fdc02581df70c0476b63d5f7bcde90f742e4c
Commitment
22a783b604862bbf983835bf9a0cae723355b11bb1f13ffdde285888b70a2077
Range Proof
672 bytes (Bulletproof)
Memo
7cd9893400327d9a53d2f04fc060bac479ad7667d9884f0235c7cccaebf643a0aab5dcc763221831be9e3a1c626934989728cc8306831ea5dc7ded8dd584bb2ebbc6d7c77f8d30826d0475af67c25a0c574164be86ae7677efd6a1a36ea3f94ef69d5b134b76bf7a720dd041d3478d18180908083aec7206459762b0ed857e73 (encrypted)