# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
98b1a0b8cee328d593f4fe3614c44030d948470f84c179d78d99caeb4017c72d
Pseudo Output
101403f50a8078b30b49646f08a15a73ddbfdf1450ceabdab2e336b818b33337
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
184489147a737f9dd0ad5c6f9b0753b6f0efdbfc63dbc71777c9a1b96623654b
Commitment
16216abe059781a9959f07345be45e66b188a62796295b24c62a7e0ded6a6f73
Range Proof
672 bytes (Bulletproof)
Memo
128b94521b8f4c5b0294ef13bd450e4054441157d92dc2b21d147562575aad1f0605bc35aa74d827405105c668a92cfec1ce7769539e4e2298b2601bbf484acfe6df992b25d01f54ec5fa9d5de5ab1efd8f8505bfc649ec2c2029f6a587527778a3827a301ea651ae15a2819566fe2d75790424a079fec816a59cfd9bed75cfd (encrypted)
Stealth Address
90350cd5b18ec1930e5edc3448e61e5b1bce4c0b636062f2b4e70144491c2c13
Commitment
c0ab90366d4246bc41da76dfb95200be75eea3fb0f7264af549cb3988d2f2c00
Range Proof
672 bytes (Bulletproof)
Memo
0b3ea8d4737d1c5a1208434ec39e0561b89204d42dc7946fbb6d717e0b592af06516c23053e266523d33d11a4ef03b23c32cb1d43b8c54e367ec8dc7535890f7496f740c6dea49ff862669a0036cf689a1ba4269ff7e37cfad0ab0607620eb75eaaebae433084e85c4813feeac66362d2aed2d774d7b7a96ff661f2ade4de93f (encrypted)
Stealth Address
70fa560a9c76d736e918f355a6581f86f81d4bcc727d75b0d95bd506570e0b74
Commitment
9e4a42d2e3743696f686bb38ca6b61a2bfab34f8f3823addddeb38f0e500533c
Range Proof
672 bytes (Bulletproof)
Memo
aa572e53487c222c672ce6a46b6c2f0c108b9f90c82dbcc72b883f6b6f838d07139d9c1cff513a1c74904786810145a70ecd5f71aa6c0266473c0dfa47d8c2009517180df00d4afc604bfb1406be51376fb73a233b369acbea7db97da6e019eadb19f99d2b5fa24125bf5fc955628a95abb6f3e5987e79ac0c5c9f201920359b (encrypted)