# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
ba9cec431151dbc60a7ae5f22d66f24b632639e04f1f14631fd8283024bebc41
Pseudo Output
6e69b28fd65f6b52b54b510b52b4c003fcdc7bef9115107bcea7f12d4b93e27d
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
34cf4334319a51b380c59fce007175d4aef657708d2c78e10a4391f00291c11b
Commitment
308a30ec0844e9fe3ddf0874a4aa5fc4b735fa68fbe52c381744a47d3526533d
Range Proof
672 bytes (Bulletproof)
Memo
a21f922b20293f1b926ef4ba7640b63488f6940c8f610413e6aa249115e2a04e6e5ba2c644bd607e776e0268f4de852ccbcbb3182fe6a4d400fc7b4429757846cd4f7e53d00e582562c933f6ecf15925346e8b640abe32f9802db5085f30504c2e8ccd3bca3452f562986e03e4779fdb9a632892ae46f34c476b174084aec2c9 (encrypted)
Stealth Address
1234f1e231073e31e6ffae2bc9de93d1edbdc32f02b80c81360f9733e10d9924
Commitment
9eec8fcbd91b447e2ef5883b6fce3a0050db43486240f64fe243a34d71b0f407
Range Proof
672 bytes (Bulletproof)
Memo
3d953bf1f873c324bdee770244277c086202111810fbfe2e38405c3af6f3917ac5016ca0db2bbce4d1f9245f82100111a874c44a9d400a0c19cecee90cca332e1d952bc2ee0a8cb9cb7f6f9970d2c547f8931cc967603775b507c4ac2b94710d08c71010daa34c69cd3e139ff828cf31abaf110eb27728ccef66ffeadc0904e0 (encrypted)
Stealth Address
fe1a4b8b8a1a49fa64109ce31e54a21e04e552742fc657a0b9cd98792cbbbb22
Commitment
2a485da58460fdcba5c02e5de112aca360c291921f525f7bd290d3b2a17cb525
Range Proof
672 bytes (Bulletproof)
Memo
5e2df40e5ab149380480612e3bd58c43237249d2072391d0c2bf92fb16c9b545b378c6e67e3902c16e13de2d61e5b6654c2d62864d526051c673ecbb8d0f7d8298a27748ed487c9885faa71de2ecf4b5099f53b8b5e4ffb1dde934cb8e590ed69809b051a70726e592a91dc5d89b3aa06d5964f390111af71a0d0baf69de71f2 (encrypted)