# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
900f90f2cef878107ea4f67df9cba383ff9ba9c69f7321d3be90e2d3f2f18677
Pseudo Output
3ab2981df9a317d854101019643118613ebf3116034702c4b98be8ad28121020
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
18e7e1fb4a0f576a3d3ae9fa66adc8d9a36a50307128fbb350ec3a05c2cf4f60
Commitment
105948c27a29694f006a1396b965ae6fc12ea6869d0f2e41d983bdfd99fe9508
Range Proof
672 bytes (Bulletproof)
Memo
741e745e7b72075d6ebb51412ac2e5cfc2cc2394df3290708a2e3a007e27068da87facb901b4e8a71fc7163328024e337a1daff8e0c5745003766550cb8520211e9c471593a0a2f40a1171caef5c085667a40f8ab383bfc728eca1e50427f3a6fbd6654b2c9539f41abf8470d45d7a66e3bdfef474b38cbdc6c7fe3c3fd731a1 (encrypted)
Stealth Address
929ef8485ee9219b87a15cc8f7904d45d41263ebe12ab7df28377f8086b23e31
Commitment
3abf0affefda4772378e03fe3b7a530408e5da2a0dcad09b15498fca00fd8d38
Range Proof
672 bytes (Bulletproof)
Memo
dba010203f55859b12cafc0bb9396ae71ea651ea2614e6cd09cab15ae764a212ed0a27200bfa2d26c855c6a9b3ba881348fb9a92c9146b7e9bce629c94260314e187edc7d85bad7c913a78bf08b926ea66bd2152806df40d159317aa0e68c3055050b16389e7d6421f0078b6b0fc00d57b3b7caebd6ff1f8f3c3689b2d7c819d (encrypted)
Stealth Address
0c2eb458c240c1d56eb334b97619a0613fa1634b83599f08ca9182757073c338
Commitment
600984e7f5809f750b149f826c430b673b2353314670278fcc4daa7131f30d5e
Range Proof
672 bytes (Bulletproof)
Memo
c1fd30c258ef2b58f8a46665a482a7979837089497ff2cba06031208312eb9ca3403eda101fc18ce5df41838e140500cff2a0903e64e98b04f2e7742971ba754566a6900a6a09d92774ee704771e812f9b6a5a2455b8f316cb7e0268968cfc7910c8abbb69db38598d720fd188f1f29b9cb15eb997a6ad10019fc481a42221b6 (encrypted)