# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
08ae7500e0083f2ab0553d1aca1faf7bef421247eacb337c9eff6cbb02d1156e
Pseudo Output
50f4bb41e5a3689fcc79a70187cccb62b104adf116aa3e45e55596cbbca65000
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
4a3b8c2f0d9d3406761ba2b416de3264b06e83b9c5be9075fcef779b77d4d743
Commitment
529cbf5f7572bafd2206dd7fa5d02b59c55c1688ec67966473adbdce9ff87d42
Range Proof
672 bytes (Bulletproof)
Memo
2e800c4bf0f0c8e1c7313288afb2d4f77a27db6de35fe55b4bc922b2f87450f497e2023f9f91160cd70540b047129c04309899f1800cf97bc6d07bfd95d6e928f5e3f72ad8756b0d5f7dcd6cdc6b9eed1db4dc03f1964203c41126789cbad80a89996324fc26bbcf81a1c64457c6f58163c22d78ca0f7cb7319aeec4e5f859df (encrypted)
Stealth Address
869a2f5eb470cf89d2c2f39b6478427ccc1c284cfc818212686bd3a65adc732b
Commitment
3867737677e6dee4938ffa1ac970d04a71e2e82a0d646bd7d8eed08e567f0358
Range Proof
672 bytes (Bulletproof)
Memo
b6b1c1170ef39b2b52e0853443b63e76d89e901b052a10aa69b61b7a5f02cd6429b55a014a6d266edf9999e6a9eb8a0c5cc464b9659c148922f81b0965e37a423c9ebb54b7970aca9d666c988dcbcd78a9bacb9e9f2a032796f4fa431021d53e6c47f7755abb92a1a9f0fc9f7d24e1eb0e222220950d4b9035a603902228d40a (encrypted)
Stealth Address
e49b142d6892f255f503679e0c5b62de11e245bb6bbffa36cd91d39e29aeee56
Commitment
d26570832af53905d7fc1e0560b7fac48b51288cbefdf66935934fefea4e650d
Range Proof
672 bytes (Bulletproof)
Memo
161ae56d457f34d2ebb88a87be2aeb763023576d81d1b1184c005244d1ca9dfcac65d2a77e0423d3c01489d8b8a29c7a4c92fcbdf48883e0fd5ea5e430e8c7f3ca623ffb87bfd9f030af28d8b43d0fec597f07d776a01e6f06e072e658037b2b54e3183f6089332528d6ca85284479e70d9d65aaa469d007f212605f02d02008 (encrypted)