# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
b253f879f7c70a9108deb8269ab8d323ece5145ad9f84ff0d1408eac2136a23f
Pseudo Output
34e9faeb5d5e51282a366842b9436aa58ddb039c1c54d3e77c916ed5f0c47825
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
a04fc45af5551b8a831bce1959728f5e69e3608d61acd42429ffc753e6bb1675
Commitment
5812375f1505244d0408ebbae4e2f035ba9495dae7506466473554f44947ca10
Range Proof
672 bytes (Bulletproof)
Memo
9561ef50bfad1b9f7acccabb0836a01174820d05f55c982eb70813622b475da78e26e377e1b0a5a553ead706645834809c2b575e1fe0c59af52dd7fc56654df15d5b08fb30714700944bd3e758f2c8ba121493508e1694b5c2ee2b8e30555179de00686e9f3976eb735c704f5549e7a6e379195e8930368a96c805134201376c (encrypted)
Stealth Address
2a2a2e06234b95e422ca1a406e9aa5141acd3fb2b7e478ffe09832e825288958
Commitment
063177c5a226faf72014d50b3190d8494b3b54862f7b25c42b56b7252e227c20
Range Proof
672 bytes (Bulletproof)
Memo
7c9bcd90a5bfec5dab686074eda23db79a0e10458fbfcc2dffcfb5be73c3a70d53fc266a2b0edbffda83e93adfdf605431eed2cdd91e0fc286c1c7904112d0512243a10cc24a18eee0dcba0b6a64e72c9d1efa4f2ea1a1a62cf3452663c66b22e08b42031911f7de6c9f6dae8ee8a09d36d3283357ae6af683c8829c377ebe42 (encrypted)
Stealth Address
d46d3fd77694e734ee3ecb8e39ca74e223d339396747f972ba092fcdbc992d7b
Commitment
723f5077964610fc409fd3e374a6a23c66388c462fedf96abc6dddef9e0c6a0b
Range Proof
672 bytes (Bulletproof)
Memo
30d009b43a10d38a47395f99eb0fc0c4079f3d6d4f460f7768be0bb54d076d03e429cd925f347af4eede4a0c010508f9729be722ec57a02c2cf922b77a712e361903033e52ef444dbdd4fd424d02a1284a5445b805c3eed68ade47bee9e4704a309a5873cbef7d0d5e8de3ed4108aef3642cb44c6c65f363e2e90bfc98ad266c (encrypted)