# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
3c4b492214c907d1b1be3f2ccb3eafb99fb5e4f64ce10abe67b77b59c7705f5c
Pseudo Output
bcadbe554a0e6737dc7582d95c8736222b6acb79e6121c0bc12db7df90e2ef10
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
0a0b06f823df4eaf364d28f9bb6669648b2fc69ab8f3b1657b415a81331d5745
Commitment
a209ddeac75f6def7338a679da2f1cde03932c5aed907a1bd680e4a25b2a4d73
Range Proof
672 bytes (Bulletproof)
Memo
88e0e64fb00606c781640dc85d9dd8b93ecb51330112f5485051884a635f95553e4b659d6b8fe10d7a96012e2ddabfa98cceed0709ca1d0450aa6ccafc9cccf0791b35db2d7282b2bca6fa22fc7337a11fb05a9b69890ef32a84229fa794ac03994a58e2383b66a133c21f25f148e133f2bae0ee2788e8c0d1940488db049112 (encrypted)
Stealth Address
80d24890c4a7b907ac34a78a935b94c300e594e379a4f39b9dfbdf3a2c3fd360
Commitment
2a0d053f793fe22ef3149bd7360812a52b3315cb1ab3d2e4896af2cdf54bd201
Range Proof
672 bytes (Bulletproof)
Memo
d62318bb5d86da4b73267a6bda8234a8847df44448a874cae16504f4cc67cebcef205c94e7f0db9fbdc93c60930af6f5cbb808bec6c7e06c179a9ffb5f2d479e8929ef9802bb81484d41a224dd365d63771525b30d1a80aac467fd01aeecd74b212a09bd87e202de20e82713675292dade79598c3159ea4be44100d6a494a269 (encrypted)
Stealth Address
5e033b765dd7809210063966f36f5c1e307cb9f6a2a3b3f07d7c2fc73014ee49
Commitment
8cc7db44203909bff85638b9a860292a96f39490465f02f9454889cc51447e04
Range Proof
672 bytes (Bulletproof)
Memo
4ec46126a7b377e48d8736bea432b68eeb66b997ea737762de3fae7a3557825ae28c0146f12074f748c5dddcc77167a7bab51d0e52ce217667130484b68bd23b136dee9fdf528ed588dc8a8606c5af3ccff4d79b16a42e078fed65ec510fecc86fdf8b665e9739a3b47ba2995cda315fc43ffb2f93afba1088b426e26dc9c167 (encrypted)