# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
9c207711cd0377e0362d097e3ec6ef3637a801e104fe7f975ff91e1c93a8ef2f
Pseudo Output
3efe1a0b8392549f9bb400e9194b577a536585c991185838398e4ecfff11cc77
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
4cb7f612427f6d64882a1edf9ddd674301542bcff98bc3ffd632e63365283722
Commitment
6242cb95acbde7fb673f1ec484fa335ca460ae65c63ca87607eeb17c559a4822
Range Proof
672 bytes (Bulletproof)
Memo
41ee3c599dc4406ab38f83215780d689664010dafe4645f23f6b8d2a9616a34be26dd357fb0a70ebf85c1d1039db051c09a55896ac1fdea92b52b14f565616f964f2aede40cf856a6c24c445be02740a4989562f443ebfeffeb2be3d60e828d34481502f6d2452482d1978c72bf975263e01deac6459c5338f4095a654655a5f (encrypted)
Stealth Address
0a2d6b08f31a24b2c5f25a807f0d6683ddc12a2e7b97f32ef3fd5eaa9a4e2058
Commitment
4c3f7aaa388a0cd7c7d95c03e96b961beb8c9a1a490ede9090ddfa817389b01a
Range Proof
672 bytes (Bulletproof)
Memo
8435ac23005f3f47c443883a16412f90892e1cc0c21629a366e0eb8884ea02fada2e5adb56006e0e424f993e1e38d888dc8fe841747307c32ee01b99339c94b5e2537d3b978d187ba757a83405d529365d80d4061bd8a45dec86aef2b91db3fc8e632b4d7507e1e30d46d199214fb92c1050e7452232c2f7e7b2d241893f855b (encrypted)
Stealth Address
2aac308724b99bddead5b13342587893f7d16ed60f17e09b35920ac1b97a7339
Commitment
02c98e00e029943947cb77886f2051d31a3b04e216e5c9967995e5b5658b0a58
Range Proof
672 bytes (Bulletproof)
Memo
d125a8fdf0c3e37a90cfa09a6b0dd912c55b03899d08a23b28ec89396ad834e7ed059113e4769834f1b22f27a5f808be6b3258409e6152e98de81f2ad729c718070994b30399bb188da507b8125228f2c89ae1dd15eb17186537be265cc7125d0df7f65f7a730011a9bc90e844395bec2259831821f474cc116d6740fdb5b2af (encrypted)