# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
16d4df36a46a80b9a3ff7a265994f2b32a0d54abd9c0ae968e2c91e6a83a066d
Pseudo Output
b6d61cfd15a8e1b566ed018686ee0259d277e1041d41cbb488278eb3fff2185a
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
5483ac47ec80391581b64baf0a0914332ac0b0c454db7c9d030d8903f911a568
Commitment
f4bf869859c74ba422dfbd49d921ef1b2f26d4a6e46f1372dcbb7c5111c47137
Range Proof
672 bytes (Bulletproof)
Memo
7e9f5313be316ca32623b186e870672f6f111f6f1abdd88af315880ed49f40b5f7bd600c4d20c0b29851705069d17d071f914f17f3eeeb6bb895067a20d60b38cc3b5f989fce703d86e0b6d3fc82629d69272ea02127710034de4d0159fa0b5c51a5bd0f90711b7952a3e8ee770e25b54ba69c02bd2a0a646f7104d812d64230 (encrypted)
Stealth Address
0a2b69374ad309a45b318ed4065bcc9ea3f2978c25c076505b4da378b63c7246
Commitment
fc8e3b89db32e144ffe69d228ef6251582a1342fdbf1c0f8080ab249615d6e6d
Range Proof
672 bytes (Bulletproof)
Memo
42b67cc4dbc487fcca78d1a31dd809763b8e5eea03d91ac5d7eb36361c79bb89a00f7767b785d16db8adc11ba8bb327958c78e222a82b0aad1d1097510a15ae0cdd156a75709bce04574cf0f08bda3a84134e507cafbeedab0456249631e713fdfb26897c905f01afa5ab11ee86e1a3ca0831b7b38d5b1a992a91a1582fc634e (encrypted)
Stealth Address
10692eea41814cd8155b069b43688d1d79e0d12efc903afcad8d8a67c8ca6e5b
Commitment
f05c4dc075bbe98e2eb89547c8de4a03695ffd265f7a634d2e281b502d81932e
Range Proof
672 bytes (Bulletproof)
Memo
7bd7c94c0a8060ab1cab8c6b97ee4c90260b9df34c11c69d46a66e50aba2dd2794c0931d8662b75f879efca2698572305f855f2defc8f4339b8a7460c3dd49e10d3774948543e43b1eaa53eb74c42b9e26e19b718b6b2e8043e9be8d3897477d7f9eb3818e7bbc43e92421c439d8028fb5f9dc0da53340d8552c8872ee279884 (encrypted)