# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
940d40f4bb7cd14265d9cdb4835c13f1bd61e3a2789d93076679828cae65d974
Pseudo Output
48c779952dd2d44c953db80bbc5f724d998cd3848b0708d7e2a8f125c15ed645
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
426144d41406950fe567e66fdc76d181edcda351f5d1ece753102d3239d7037e
Commitment
503bb6cf2fa0700ed00d2bdd592af413a27ebb67a015be9444205a5d39ce5b09
Range Proof
672 bytes (Bulletproof)
Memo
7773ff4e6a9ad88289bca1560b3981406cd70b85982ccf2d511637df09babab71f6e79a51969303aa9934a805af60cd8f4e30155a6a776c451cb489e28571e14a1a90e6c4a2de757eddcb71a7be7c54a9e12881861428dc03cf733e76b212fed52f17fe1523612c9bf225a36f6a48902dba7a06d9f8acb4315f3b9e00598ddac (encrypted)
Stealth Address
1e464e1300b9c854ec19b617bf5e777ec030b69cd21fb89727db9da2ee888f1b
Commitment
8ca7ca38edc1e9eab0c6dbe9045f19dbac9a6e1491ba813a16ac0aba1ab9fb3b
Range Proof
672 bytes (Bulletproof)
Memo
c47e38b96df49403f64522b625fb4eae78cf1e6b0e3b74d13b87f57547cf8d441c84050a817e65eb46c95838dfb6f0ca9bbf449464cf7e44eaeee0fa4281365a8c6800ba90bfd290cf677f97f5f269078e92fb5b0df8f5dfbab1263e28e8e397df10322cb37d7dba9e57b795604fe6391a6d62ae720d9b56757caffe2b6a19d4 (encrypted)
Stealth Address
706aac9841a7b0b202817c7f8feb6e7e6dbead8affbeb3125be6f277244ae934
Commitment
8aac1337b2f6cd874049301aee074da812041613834f0eb40aaea9977e75027c
Range Proof
672 bytes (Bulletproof)
Memo
0d6187a62427c84676f679591fd312237a9104645aeb7ac7e732faad717e291ab0cf6a65c7027b76488364e7b6d6529953b5fc33b6435aa5f1235dc74acf9699f448351f8df4d32e6a24cfba55bab414a4c6d074b19d35ea88d70048535150b20f92e33552577f373aeeb4ef8cbe526970f79574b7b6a94870d472e196f11b01 (encrypted)