# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
92dfa7b6a469d9b1a54a4fa33ee1c67511f550a94678e611e8fe242afe306f7e
Pseudo Output
a4196e0b5adefba109e9c20ce6145f15422b51b03db1282ee279cd8d519ad87e
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
a44216ab95cdeb5b4d6ec37881dd81371bafae9931457b553b0b3534c5009600
Commitment
5229547562743a66e762e30c828eb94e0b0b57d751f262448a910e1e2cdfe806
Range Proof
672 bytes (Bulletproof)
Memo
094f1bada89a61d6fceedca222bffdcd3a83d8b49bda7be39415721753a950033beb7040ee32d31dac702ae158a7b094ed202e211a7d584a957bc9b0d36aac42eb2f63d757bababc3a80691cdb5fa251160b2e1a45cb9c7855ce06346f7f85df2ae0c6bf38f6c53473288029d0f69a95ff9ad59d54e4f59114a579acc0044367 (encrypted)
Stealth Address
0e537e91098181e313648369cd66a19f1122668ae342a5f850a0ed1a5350270d
Commitment
7895ed24cd86393317a93bcdf9c0ab5bfc19421f3eaea25f7cf2225e80d4ac4e
Range Proof
672 bytes (Bulletproof)
Memo
033eabc6c41b96a3ebaaf5c21daee1d6b33c163bca1d17629616736a9935c94f608bba2ae553a399a20a7546d28b7f397d482e7dcb013d8ff522da3ea696b3c8565b6386ec991cbe97a1a17a2f0df4e1af9bd6b23641d029ab02a65f14c3d77c064be7c4ff1525ed31c266d3acec5e415d775f85811b7d94355bde745301a9a5 (encrypted)
Stealth Address
4275ceec37c6d8cd8bb29115bebc69bd2416e3963e63bf56794edaad9d37ce38
Commitment
a26ff4d42dc1b37f191db727857a58d8ec869bf7cdc4359f907c390a5aefad74
Range Proof
672 bytes (Bulletproof)
Memo
46f1b56a6d51ac57089423c05857f697a9bb116cdbe9d1708aba49a733d6c771c16a6c32c26f0cf6ac1fe980ab77353275358978208967ce36ae1b589a826bee9177859fb18b32ad823439e9f4cd3219ad5bee34c99864756c84f464a827c0c1c18a6c47fae0d4503688485175e4633af1a4f52f6764e01b503dd75f89f63cb1 (encrypted)