# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
0a1dc91b3cb46cd9989bc743443fc55de435169dfccdf7fef09fce65ab0a3759
Pseudo Output
06028721a44522c34b14e8a3a3b9c789e7465b07f17856f748b05631dd817433
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
3aa4d77034c426f439a49bd6929c12f5bc3e2d685a8c642340fbe3ba16900e58
Commitment
2c7c8d71e60e31c7e673ad7722aa233bee6872753e6d2464adc472ea2885f873
Range Proof
672 bytes (Bulletproof)
Memo
c1a8a0fee2297dee7b8dfb2770ff088bc6b9db705ce56737a99fb37faa5c03cf4e128fc525cd26a8be4dca8825b42fcb3e2fa2a2c96f2bdcc48aae8456fbe52112b4a977729b8b137cd1c1d5614caf525972a8e1965d077d23c5db5a9a50c6a315bcc97c4a27da144aef15fa9954a3c94d8b063f3475a63cc13f2eeba5bc3315 (encrypted)
Stealth Address
2ed5fe5af71eb57e3c1e4c48f1b9a5c59f929a1eec49e1e6adf2abd6af420327
Commitment
744c8b3778768b8c3a7b7e1d325753482795627a954c7abef29beaea99de8711
Range Proof
672 bytes (Bulletproof)
Memo
b4b84e0dccc2954e2a626ea9276741ff78fa2afa08bc541b2291e99149e29a262d735c8f988a240f67622b8ba83d440e3b2cd952e3d64ee23a9154afa90c7c30ae6c8b77fc4c048dcffa1ad64492d640b431b877f4e6a98582e8e44ab52caf6082722a25567b1db84f874c4ec304311c5520752e89e89cc3d13cc07c6d5b05a7 (encrypted)
Stealth Address
7c36fb802ee34c0168aaf2423b465544270db3da1979f2f15c469fed7938c849
Commitment
c067d53870aaf358c8929a5e3745c14f083aa3ac89b6cb734c56faff040b3e29
Range Proof
672 bytes (Bulletproof)
Memo
ad168e67a58641ee4beb86daf2a6b5249023762737397607c768d6e95a49a72d910aea25d003fd145fe15ddd57489601ae2d433c18a469d7127502b173597265aa84a9de3091ecd0c10a8072add324c62fbd3eb1d14e4d3524f88c734496f46f51abb822a1800a2222402fa9e79b6eeb17d3e405331ebb34a178410612364352 (encrypted)