# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
9cb1f7a432758c12ea6427a34a5c7a9efde7ae3fc66c97816b1fa125259e6d45
Pseudo Output
9eaa9536438726628444671228bee90d8366ff24169c46d5ab496b470db1d170
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
94f153ec53d1787feb978bb575b1f2f47225ea27be99e5d95edc9f0c6f3de855
Commitment
ced5b7743186ea60afb53c00fec79cb4083b90e4fb53e4219e4704e281194675
Range Proof
672 bytes (Bulletproof)
Memo
8a9e8603a68de7d7866e96113ab17ede68f2ebd4fdb5a62ef0be47d5b683fa0ac960e2407e1ad0fbcf5ca88a092cda783658dd67a39d2e7744279948aecba4c1c8adfd2f0680b53a37fa143766771835f185b0690af4eb33168cd4ee9503abeecdd223253cdb026b2e1b33d09de7c3617a932767b9db15937674f5ceb3449fe9 (encrypted)
Stealth Address
30df0c376d2883553cfef8e52f2cf951d92875332291fc68bb0e707fa37b5a4c
Commitment
d27b6512cf61354f4709bd14a7fa00f042cbe82fe188eea4e1ae32eb54cc9c4d
Range Proof
672 bytes (Bulletproof)
Memo
a4c5499272f4823ddc08ac74b6044790acdaf1abda12e9053bee3a3549132832e1a659de689980d425d5b07fd098490e4af8ae2e323f6b9ad9f52f6a0bbd5e0be20f0ac02d53f64dff43ba47b2c3ca1b405e6d38509e33d43eb143cf346768b6a78a5b5aa84228fa90eec1cf2b3455625947c20499acb9c9ca9532a23132779c (encrypted)
Stealth Address
44964dd61ee7ed9422a077160f801a33d274f8e3e1d361e65c5399912dc2323c
Commitment
4e969044b4c3b7610bf6fe4c3aacc699ad9d4c6e8d2aa5feed2d9d27dccd412f
Range Proof
672 bytes (Bulletproof)
Memo
b3943845cebc02f6e5cc74c61e95ad1e0c5a4aaf88802e42763055a78a614cd19ce4e318330405dad725234327b61dfa361606e6194e7d50c51986b0b0a5af859aaea8c89c1b98773e0da96bd71d43ebc013c31a044d7cd50b4e1808b492aff9a8766132d1229bea28368a681a236c4a57fa69e8fc4bec33881a695b5ce52453 (encrypted)