# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
a633a8660d2daa088fbe0634846ba7129804c86454209e5ea0a44cb9d457fe3a
Pseudo Output
50919ed64cbe42f45407be4c444e738d5ea640c99b181d48f06a0fcfe1f97418
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
9298ec82779e74a3af993e6bc2c0c479d02d411a219fef02dae864d4be33ad07
Commitment
52faae83f7d7a6763aea8783209a7cc5a8345d97d53958556473002d7ae36c4f
Range Proof
672 bytes (Bulletproof)
Memo
8de83c9ccdd4f72089e466eb3c5b2441ad16dfa41cf2e99f10be89fca40c0f83c945ab90a81d925c6fc34e1b44572aa6d4788fc54e237de13e5f71123bc43b934ef0881572ef6094627c5c6ebdefa340b329dcf14a25f00c560cadadcc5676768c2c1cb2e695a4b7a34d63328a15bf01c5724a37ff825b7f80b14ef3f66e2050 (encrypted)
Stealth Address
8cf2b6b046478d7135f480c164fe3fa700cd902da42d23c817fad19fab5acd06
Commitment
a862ef3ac60918cfc82da6f2896421938739c08fb0dea3a22e8c8025499fd458
Range Proof
672 bytes (Bulletproof)
Memo
1023417b0bb45df63dbfe53cd2907ab5ce8c693ef9fa12ec1f8182bf1bed7713e34fe24330f87e0ae0d8e1fcf879a6b169f9033d9f9959a7def3b768df7f29c932c5afa64f1028f6fada09db87c875179d96004bef72853800d81017d679a015a697007701567faee407e0f6b16c14b37c4a43903d509aa358c070ee4c494187 (encrypted)
Stealth Address
962535938342f855e5025586d7a4dbed7d53930b78b9d17c81f9156ad8126973
Commitment
722f9b1190e6fbf038027ade8e2d2397c352b25ad034803d81439e585e67c118
Range Proof
672 bytes (Bulletproof)
Memo
89be6b95139f6687eae970cdfd209ebf914a20933243111c56410e4c01500133a16fb1e821b96eac4c410071cacf547a8b9e3874d242bece102198d5008669aeb0a853e6cf30426efaecf2a1e7ce76716ed6bc50047a99072ba5f9b17732c3daf4ee9b6bdf3d8cbfef4c95e92abb486a8f9a284926086035136cbc230f68bb3f (encrypted)