# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
06e74afb6229339d265e20aa115e7a5f2547d1fd7d4819ade678ce1c7d068111
Pseudo Output
242ac556b44286200a065a5f1c4e8bba2b900bae1a8ae09ff1e39a37fcc6fc2a
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
88c952d6f7f0d7a4f47a108c94b7a0adcae77ea680f6b791069419797e97f81d
Commitment
9ab2efe7565dcd352bd9e4162959de6c3a95c5e24f725c5bb8f40d6a1afcdc23
Range Proof
672 bytes (Bulletproof)
Memo
08dbc4f4fe27af99d206611e30e43c7eb3a020d9a51f85817264b5de95e1ff5c155b50a3fc77f2b5c162e394eb0e728ee37251b5fceefabf774fe60597ae8a79322d57d421d1b65f84057346dfc9535271d3cd2e4a4f9e1d24001960337ddc5936aeb7d6c4f3ee87682a63999ab1854daa6351fe0dc47aa374ffabfac17e15a6 (encrypted)
Stealth Address
c20f7efcef6d46ae992c5478203210f68c80944eec4e686cb2692adcb4bae874
Commitment
5e0ad28b436fef02f43d0f3e5814daaeb7b98fb7c9d76884f53a15a38faed519
Range Proof
672 bytes (Bulletproof)
Memo
706bbd008c0b6baf6ae2c9707d92ad274154e30b13e9a7fa467fd37eaf80f10d0ab2276e34906fc0c98415f3fa2165caf8dc00493412d1455f0bf07033f45194da06ec88c4b2d42a31146e37c8fc04062d744c7fd5352a6c604a9c3f3848b8e780822c1eab785c5c3de75ac62863b29b52a5c4f0b134ffdfa540316e2aaf44e5 (encrypted)
Stealth Address
4eab821d1fcae3e13968e0404300799ff20192f863d5fd6dc1cca9abc0c0196d
Commitment
5059cd577fd315062d79d3766527877d2fbea5e990f067439f5b03826a6e224e
Range Proof
672 bytes (Bulletproof)
Memo
b2aee16ee1662c4355c1ce680b19abc65fd04933fd54d2d064d4e9e6cc5799611d043edbe9a2eba258f828230ccc31800225a6b220610ff2929d2d9753e8f078988f25ec59e1cf6e4a96e8b2570073c83199f75313af1031271f9925e2de2193e0eb8b94685459645a4b01811250926e9320436c2d60bc043990ecec3bf5230d (encrypted)