# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
400e66a1a533e546caa877431fafd459a8486530a8bfb3e0e3905afe31e2d04e
Pseudo Output
78034aaa879e7d579f71f034c802b471895c685a972b2289ea6a377c06335261
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
b071e7224aa447ae7a36d689d572116bc3a31bde47900c014eba7c8abd3c4677
Commitment
608baea44add4582d2bd45497ee8e30895ddff0bc6778cbeae4a33e745a02a45
Range Proof
672 bytes (Bulletproof)
Memo
35fd948652052c668a4910717dbed32dc380dbb461d8afe16827fc16931eae663665291780a27fe23a78d9efc23e586a4cf7b86622201ae616f0bb562801faa222eebf6c74040dc17c399a866f8a7a1c983f9b89c02d043d226a5e225f95d4e5860ea25a17c6aa751b922a9afa06ebf130c569f3eb0d86c17048d6516da41bcf (encrypted)
Stealth Address
acda2b7dfe47a253bd05ecd6f11e6403eaf858a0a293d426ce48814becea715c
Commitment
2870b7cb4c93fa4bbff4a1600fdd137d105e0b6d1ae2bc8148a11d9b13ec5951
Range Proof
672 bytes (Bulletproof)
Memo
245c6e6f695f286dedf6dedacad0fda47f9bf66816812f9c665a581ed4b7ca2e1ec554db531d12dc3b343b51ffa77e6fd49ee1aca1cb2a716005a9982e120a8ed37bde31f2c4d9df626d6af168c9c4211440af20728d8e3ea3ff19654570921f01584e6d4064b9c9c8fc132b0e7ff36969da8697f1945424ac5cd252e5305a7a (encrypted)
Stealth Address
4cf2a2efada8548a0bcfd487b0e222d8bfc0c5ba89f8b7323131f1a0862ad744
Commitment
c62ef63d9b68485f5121b215da89472776b807bfefaccc3f70e602f80218cb09
Range Proof
672 bytes (Bulletproof)
Memo
d62d59b2a733c1cffdb15478bbfde3c0b80a9da6a360c71696625a54cdbd48652f6b354f4e5e43fdd84726550bbe61f7fc969ab069faaec4dc71f828c98774f8f6872d4d902c34e5cb755bf0d3be2da2c3bca1a80a663b5c27cb1ade3da88ae4ddd872b91eca2768bde3b2d9d408d8b6f5005898529eaa250383a80b4fe681b5 (encrypted)