# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
6698a44eed6355f138051a44228c908b55f775a3d22b6c3ae930be8516ceb542
Pseudo Output
c049618e74af0c4cd8b71347c8956fd86c0956a5574d4e03b66f6d9697978b16
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
90409400bdeb2831e9d525b6f77668f79aa1d28011622d0487b6df872fff337e
Commitment
4e59667543932560cfb49d6062a953192655b84426a4f36c9f37221f8662365e
Range Proof
672 bytes (Bulletproof)
Memo
9a328f1b807ece4d9174eab3b8e714ac88b63df82a4fec5b50a9d381631a1375bc5b2344bbd61bdfd78a8731c34bb24440453f0149b70c12817769e5b770d76f7bf27eaa762e84a45da4f844b28a7262df1f28380d9604327889e71fbed1950906245ad9f4225e116c24f67ec327c24bee2050d213cf63b45c9461327fa93a8a (encrypted)
Stealth Address
78a2f5445f874fd937c080ed52708edfdb4284c62019a6598499ebadbd729e50
Commitment
be8f44d7eb3a081253e67ee809e26b993c5f68fac513bb28269adce462c98948
Range Proof
672 bytes (Bulletproof)
Memo
18ea881803b9b0ddf8c3cc49ced452d6b203228510812d56ed1d67e9bf92bac08413abe295126ce24b10517ea891e7b2c180fe8a1199fc03f93984770605c5269a0bdf255ac2c724a48510c28e4aeb7d8f81dd3e8e913e87c93b1da404fa8addf40f31e2d609e466b2d842f0729aa4a3aba287bed84a13283d77874249e56a45 (encrypted)
Stealth Address
bab9bb3078db732aa8e68115e3c5877dcfe83cd8fbef2154bf3bc7d56d8d323f
Commitment
48325f25d359b4279f5d3de372bab08fbc7ce87c4cb0eec0fded24b05b8f232e
Range Proof
672 bytes (Bulletproof)
Memo
2a3aa11c97929f5640465e8f014b22b400decc0793efaa079e4c2d5ef37f63c24fbb14e4d830de289137614da8163459ea6b4b8571edfea58c8085cf85ea593c1566e7d26674d0f82f88208e217743933e6d95d542267be2c561a1015e7b6ff5ac0eecd774f1d188bf86f8b09a90b7fdfadfc6d065e4a8c90ccaab7699ff5acc (encrypted)