# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
008d9e928356a9d4a3196e426a7a61f701625b8ed88c697fbb8fccf768a69901
Pseudo Output
98044cb6c48046121cb02e0098c62199e03dd434473dc91a2ec81cf13e673b2a
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
a608022307b5d520c8a269c298d0477a1e418f98f6402a1fc3c2f3404d623406
Commitment
3e158b66a622b2ab77967f16f428cb0c5ef28ffeed61e4d84718995309fdb903
Range Proof
672 bytes (Bulletproof)
Memo
0234f4e39d51d6934cdf5d4c47a6c690d87d9bba4fe5d0dddf95a52cff4d82acbe409a744907e04ec0d8c422c6b86600e4212bd191c5eccf46e76046b8e07c1110558fcd0f81cdb7e1863710121d6158918f9d66e1f6d26223087744dedef1a1c5e1a17a9605550d07ca5ebdff488dee83d0546ba4f5c4a491c2f36848d83103 (encrypted)
Stealth Address
f4e091c88a5e531d2e0b76b523bc57b7c4a04904189510ed390c425dde6ff94a
Commitment
9a623d949804fa61d5c528530b32926c15d45b84fef92f1b29686587d541112b
Range Proof
672 bytes (Bulletproof)
Memo
372f2ac9dc56190e6e26c6a57be3669c5a602d181191eea5474818d341579f58880215dff988acf3de0c74d951daa3ca3daf7b1775da78d8955be54d28763ab534cfe4a27b88276972619ab6970145df6eee7ffb3262a7641b5191e6b9ef36473bfc2e20adbe45d94d4e35bfda99d7c91c5ab3a9bf3a7620191ab92306ea5ed4 (encrypted)
Stealth Address
422e42267d0d726f23861c152e501b0539474306318a03d3bfcf5a6b2a734c7c
Commitment
a80202a2f3118950dcd4d4ac3535e7904b3ca3a7979866aa836d55617e865a3e
Range Proof
672 bytes (Bulletproof)
Memo
9dafcd0ffb03970bcac11ec5d526dba96b495cb86c6983e3e43b25dc9147e94c62d69f5529264e1ead8397d50fa3f832d299cd7ab9f6ee53863ed8592690558e05d89966a3a65a89d8f4a4c8ccead5abf37c150865a7344cc5bf4038ebf72e6d6a6e010e1047bb60eda720fdac84c419d980275910ff012381ebadba5a2a9fac (encrypted)