# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
aa03756b1ded0e0cc185fd08fc8acac28d2c9c35e73e2d079cd941ef69014014
Pseudo Output
36dbcd482de90b7f209773453ace8afbcc7497ea8d97215505026e8663222742
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
3297c50111074ad142371fac662e65700a64634652e783720ecb005f40a7a77b
Commitment
8a1e8d92ec6bc0b03fcea615bbe82b87f55f64d96a8c779b10d22f34cd8a7f69
Range Proof
672 bytes (Bulletproof)
Memo
c3b7e3245561551bd484cbef6196bc88551c36a5481ac6482e31666195ad76021ce414df1e924d745ca2c5f177339c9e0f933b81ce99cab41b4b18ac0c7ce0a2eb71d9a37b8c0e1d292d209ce07a22cb7f96d1c47e76879dd5c583432c77f5f9a2aa12d59ec9674c150b6ff1a7943b428861d392b7ce868a2c4bf365eb858e7a (encrypted)
Stealth Address
989a4a541d97bbda16f4770aff897e25ad688f09416d9dd748ce41444466124e
Commitment
ce968ff05397a0572429d0f2d390550c7d2899538aaffcb10144452fd477bc34
Range Proof
672 bytes (Bulletproof)
Memo
72ac51463ca89e1bef545a21040685eceb8e5523797363dad94f2e235cba7d658d963587988f608f1a03dd44571709407616461b1a8f6e3393bf0a2c19f453b34fd2fd262ede1e5a2e41b3b34836feb5e76a46fd9ee3404bc3d0a84725ce2bf8e7f58b651d181dea0f46d333f397325681e001a06833921d2a4d9d446f6dd81e (encrypted)
Stealth Address
f40c872bdf7db7316e26759d71b53cc6d37a71d3391a0b4d8d7523364a00e951
Commitment
a07c6a80da92bee674a4d4d93e9d7661e390fbdda9cfca36adb3b7bb02b1f05c
Range Proof
672 bytes (Bulletproof)
Memo
d42d34a98c50c5a39a3b75a60f8ce602cdf82cd6c1d93e6388c49117eae1374796991b1e1c6565e5045065095a849fc2bfd8a83749397e821d540794ee13b47dc3059863e4cf3a4d3ef895bdf7e9583aec86e35b2e2996aece4297ad2e4e91e2bc2620faead49f2b347dd6c1310cb9193bb83deddb50cf57b6c22a243c529d58 (encrypted)