# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
0450261db575f141d543df22d13b1fbe93f038c9252672ccffd7b0897a799b70
Pseudo Output
4ecbad30da98582efae8ade34e1e1fea132ec42df5ca16a904d2fa74b9caf32b
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
92e9c6c7c1df9f7fc1470d4b7543ed5dab8e3dbf6e4b270edce1155062c3e346
Commitment
1e5377c6ead95748d9dc0ab99cc3720bd6ac11453e217abfd885cea80db4242c
Range Proof
672 bytes (Bulletproof)
Memo
c3b75b58e3f70f86735625014f256a88bf98b12a7fb4bd30109c0eb761b840c449d94f684d9e500692ce5648d58dacc703487004a51327adb60205a163473862712d970b48bdc2b0089c172f621bb474d0ecb9ab99eb8c6b3b4c63daf0cc417d835b920ab1b46adbfed8eb4370811584d02a7355ab2e3bf8a83a3e50da412aa8 (encrypted)
Stealth Address
0681f2506abd0143f25dceec127409915b2671596d8154772a485761b781e000
Commitment
ceed17e77fb7a4ce2523c2a5b64f4bc8d03dbc5f92293931d94d94f6c60a0857
Range Proof
672 bytes (Bulletproof)
Memo
3c8f50af59714281c81d397e8da8eacbd159ca333b7c831ceaeb4405780a59f7a6b6a34e7485577a70d6cb5d7bb82d95d0d091889a52098d565161f32d414916e8b1bd4f7f686c425c51822412434beea03eec211db52b2f0472ac5e4e07c49c5207f3ef9bf5239a0e440ed6d7889c15a25d9d7acd6eba1ad4c1bb2db3e8e3ed (encrypted)
Stealth Address
7a72cf48ee2e7d036d487c654646ecc4c5ecca1ef0f1b9d96c92424a1c248e5c
Commitment
44a192c645835fe776a1db4e740109aa63a30a3518e27b3fe843a2dca8878263
Range Proof
672 bytes (Bulletproof)
Memo
ff6c1f8e0c08ef0ae2df401a8a3d0f5c06f1edc46a70ee0be8df8e09ff165eaaf2d70396138607b589f31c076ac54ba26ad92bc027703c07933583c5ff2340bd86ce4e85eb3e18458413c36d1b2f44b415776d9a5d3f9e90d447ea36b23a295a73aa097e52484c31f73cd5fb0612f2b8b46f9602397eb69375a9c8804374ac5f (encrypted)