# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
a023e4e503da7950e5ef00349e2729c9f4b51a1885f85e1a326b59d4446a2112
Pseudo Output
1ef1193594596854979cda9300bdcb602b70d1245d22694f1c67a3a322ef163d
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
1a13da0140f09cca8954eccbd07c37db8abf602fb01f4cbfd373cce432b7431e
Commitment
b05ab4f03b8bfe2d08b91148d3b61329fb1499582e4a96728cfd36dba2cf7c54
Range Proof
672 bytes (Bulletproof)
Memo
0a71c43b1a63c43bb245989532555d5d057ad1e3444fb0811b5267384e72c9d278f1f606a810d7c650e112bc115fbb536513a079a776dc6c9e76a801af4f3cbd1136e5b87439fe429b33c0cfaa4169dbaebc1ac446ae75a9055c09e7d063afe0edbd3f135911599c534fa95cf7c34b3e60008faffdb3e9417586ca7937f85e9b (encrypted)
Stealth Address
7c3dc9acfd44e1830a50a919f3274bc4d7c6be05d61fa0f17778b01e0773fa71
Commitment
86a357e8b686c21e53d67b10318aabb35049182fa27c3c7acda1f901f2ca6e29
Range Proof
672 bytes (Bulletproof)
Memo
69c9f3d38ba5ff89e71befd8f7825d66eccdf5b49156a5199eaa297e67629186c0a53b5c2c95d740d22c436b93752557270576ee05525c4b560a886881e5bb498abfcf203c4e8028f20a48cf0731fb8bbe8212c98f082e18cf313a96059371d1e2a804c799ed0c09ec0bd58ec40d4d394a29197dab22601423a0331894608db5 (encrypted)
Stealth Address
b2a127ecd0770500469df60452a3af62ce7d10a350253f60e7f49fa2fa37401e
Commitment
9a6a7e0894ec840ef7195471409618e708e2dc4a7585dd394f9ba2f530bb7f53
Range Proof
672 bytes (Bulletproof)
Memo
7ea665b2f6d0238b92e1749b9ec842e9488f34f94f026476b6ae82d05ac4c14450f2c4723fcd6803782bd9e4d2dc66519f3a2b19d5dda5a6515a4493d647fa0951d52c5b7d826f5af543e76e99d79a90043b244f67396cabb6abc3903102eaa099227615ce7034932d8d905382956cea0932da9d01f1baf805c5eb505b056c0a (encrypted)