# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
a0433ad7c5e213682b3656ab560e704568765595768c05208c6962eb984f6e6f
Pseudo Output
8a6512a269a1866002f47b8e20ee76d8123d3b2a27d68673d0eb8573e413af1c
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
303a1c83dbd2c7d3bec9420ef3c0be24250d795b680d60f5cac4fe84d5b6a37e
Commitment
acea87e3a377504e19e35d0b7bcc5b85c1aaec90929cdf4d29fd87b3ea5d5365
Range Proof
672 bytes (Bulletproof)
Memo
1af4933aec7b42dd6fdd0a4c58ef45b1c0084db26bf412bc162b89bf11f2905afd81e148d729c7cbf6a10d768239a783976943d74d685c3e7b4e2a9b870b122386b23875ff68116122d5ca28d8aaf72d0f7e80063b7d05054e90e7ad66e9a699bb150d730093cc4ecb8181cdbf675e347387b6bf5c5a03a7c50c089a9e6dece2 (encrypted)
Stealth Address
36bfbd552352a01e13210e2f9d2a666ec472e4133c290cfd99a36504747b6426
Commitment
109bcf7801f9a3cfee9ed8637bf91fc933a76e758fe06b00f5b08f69362d7152
Range Proof
672 bytes (Bulletproof)
Memo
2eddc70869d49d8c09fce63502620b6df84fb2ffd7ab5ed64bfba216a7a5a7f12a4499b59e8f7c7c313ac10511214d0e8ad36dd5044fec3b1cb0c0a2ccd6f87fafb66726e1335bbcb3b2bfc97afb2c350d9e414792c46cc564dc3b00c3a1db2f64d1188515fca725812e6c2d4dddf1a35ac1650eb2999cfea0ad8489b434de7a (encrypted)
Stealth Address
9c47cc128076d93d228927ebd50dc81834517cadd55250fae80babdc6d3f2a48
Commitment
16344a60b210905fac975676d1d9ea7341a27f118c569d90dd00c13f570e590a
Range Proof
672 bytes (Bulletproof)
Memo
90712725b6cce3151ced6ec183ec7cd78d57ed6929b5b436cee805f10f69f396b89ae1769082db6c23d9fcc0c795e36b4e68c7e094b3bd76cc8fbaf9207cd196743e885aa39d2668caee4af7a0c8a82f8888979e946afc4f9c9681ea36f969eea559967ab8a8e8cb6582a40b59611533540ca6c61e10acc0da247086cf37314d (encrypted)