# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
ae1c8709ebe0467652b84c0f799788198a959c76d2e2e5f34b2988cb8159d403
Pseudo Output
90c224019d48a3ead2b87ca0d9093884026b490e853308700db6581a58846e25
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
7c8afa1bdfdb08878ad46c980dd01a8be9c7635c6077e61394e1f7bc97ef897e
Commitment
78b0476c9e1607580cdd7ca136e0006df944b778a87e34709e76fb9e3f323f1e
Range Proof
672 bytes (Bulletproof)
Memo
90fff4846fc8af9e0acad3eae9176c892e671876e596434cc09ed753d24ff1092daf8fbd1dcc6bc7687a2db156442f16457dd152f48455b49db74dc4529a7124526bc35628556b5579f727eb179af6dfa727cc2c8dfe3b5eef260218f533b0c0bc17d0dea5455d35a9dbaceb83304756dae5cb11a442cfe052f52d11ee9c2a99 (encrypted)
Stealth Address
4482db28d574acc5df98fa08d852490bdb4ea40084b9ba694f2fc6812e581344
Commitment
583696cc37cb42917e57415f4255ba596e0df19931b9e46cf3d22d026e46e774
Range Proof
672 bytes (Bulletproof)
Memo
4a37768a822346b19c40d215bbb6efdd3dd91bebe5449c2b454eccf267952ae0d00a52d671f3abe04639cb69b08a04eedd6c27457e9727c11a01013da48f19fe78520aa702f2c9d1163d9ac666019fb19e2588c6d53a202d1282cc65181623a9278c600d0b632b0f6626343e60477145d33ef070c3badfb72b6b52ae5ab5cced (encrypted)
Stealth Address
781e4602cf6adc2739f82f9b787741871a82f75aca177d0dc7fe06845c43b459
Commitment
aa0b80ccff2f966954c8796dcbbe61a111497d55624f24b72af2f50505129304
Range Proof
672 bytes (Bulletproof)
Memo
7bf282670185669761cef88e439d1df7695d9e78095cf6ca413e72f9eebab752fe5860fa83f9345410588858969c79a08748b901afb15db3879af08e2989bc5ab0c70daf98da42a701f14d95728e063ebcac3d553cbbfb406ca0619db688823ad1c4f46923d66bdc75f415971f59eac0eca4ed92ef273ae19b8ce267b3d240ef (encrypted)