# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
0855015537169b6730e05c472c62e74069fda3ec712ed499678e2f654e2c220f
Pseudo Output
62bbaf3c07abc0db9adbdff76f7722fda7174c1a280050730f8bbc2ed4c65739
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
94a775cb6c838012cc3bbcce696221d4309596c77a475dd56f977ec2892a777a
Commitment
842ab1c20e98c6675ebc0b9daa4ff28f14411723ed4f3bc66e44c6569238455e
Range Proof
672 bytes (Bulletproof)
Memo
120c8ea78fd54f7599bf59e682096a175634f89cde4101e406131c5745106b1553f150f5542113e77cd4a779e9da5bed288c738029ab68d4bf6bf30f093ca62a693205ddc918a4d37bb84126a9f0365913dfca0e65b49c50923941ff4572fea8b9e49f113ca78cff0113b9ea28f76aba7f16450956216422a10f7d3a682cbe4d (encrypted)
Stealth Address
da7752628a7bd9a2144008460c778b9b679be3d09d0facf69e148ab591888272
Commitment
e6d4a0be8bd8f8b34990f68a22cb20d7778b9759ce70d4ffe07e4e3f1574515a
Range Proof
672 bytes (Bulletproof)
Memo
7ca92ff13dc7dc5a1c75ca6b8e4633ebeaaa18ccbd71e3d133fa87b2e8aad770150726b6b8ad0a1d36bed3c3b747797eea64c24e1d604be1cd0bcb30ad206a5a2d2fbe269df957911db4c7f80d37bca97cff0cba4932a199cfbde17a64454e5933acb8053dc1a7852380328edc6de4e1322f40fc0a7470326f6946b1cb17cfe2 (encrypted)
Stealth Address
26c6438ea3557ddd6fea3602b636e4ba0e0a678aa85d24b1a69a5d3b2823ff0a
Commitment
c6cdbabe0fba5aabbc1211f8df046fceec9c8bec155e91c75faee1263328cf4b
Range Proof
672 bytes (Bulletproof)
Memo
9c8d934ce1efcc8997a1861fb41e86f11e9871dbcc5f5a4e346d459127fe02df5e7a9c795feba31f5d04b186291388e4303444ddf9ade24401989bb0204b9a81a6628f7d8497ec9aac02a71f5f08665619afb6684de9102ff59646dc4e7add5861d678cfd223bff9fa8fa28f4a5bdbb1860bf661cf30cf3df2f47cea1dc523a8 (encrypted)