# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
90785cde250d1c41db2601a3499ab281ec83f64537e6410a446682ee8f0f6669
Pseudo Output
0638fcc5e60297404c71c8f9f9bd4bad28caa8a79653209d2abe369d5954c30d
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
2af2b8f55eb379b07c747decb5a42fd69a6b83bcbed42233ef5b8b6110cef203
Commitment
aa9c137f5be179989855e8c1053d4bde2c3042b15a86646516a4477be1a02a25
Range Proof
672 bytes (Bulletproof)
Memo
528fd1c30adcf1adaa87e3ec1a93f2e2ca60cfc7099cc571b7b8bc80db2c70a8db1e8b5cbdd483782816725edc23d6968bcbc0da8e51bc75a6a7789f9666df564cbbf9b394f1f532872e1d86a8c8724ac21e55f0594b5289d983efbebbb9cca3ed6be230e2e6229f13cd0177c6b4b7ea354a38f19d928d07fca55cbc869e0cbe (encrypted)
Stealth Address
6863fb6088874e51f0843cbd49b90f96da4e89423eb7259210e710753304d01f
Commitment
9c6fe3a34efe08066f9b62185322b4c5c3430bc0ca6fd86a175b474471e82370
Range Proof
672 bytes (Bulletproof)
Memo
4cdad7ca0dd317a80a5899d7ca4d8f4047e65df29d0ca3fc12baaa4c224a01a4bf230f63e7856b4ce99937d73d0f172631bf461e148e9f70c57097433955c8f2c985f12821ba8b64bf16d49bd4cc031d74e5fe1b5721eb89cea67680acd9969432102eba6767d20e0f9716076ccb2b62e5191df56f87b2e84d20bb306855b3ba (encrypted)
Stealth Address
a47dd6a4ec1561144e4fb9ea5a4c68ec03635d3038e1761d12537875f29fc930
Commitment
3823d464938946adef4bdc6183b89d1c3e881511e1c81807042df5e8aa21f849
Range Proof
672 bytes (Bulletproof)
Memo
23778756267333893d322ab134ab4c431314e56d3edfc844b0fe7c916490a0cc78ee091c50534f351a9b3cae8c9d6706ea71bb84a4c9582c87381c6e55c41292fe064c460ba5cd45cbd4ad7a493731fab1caa2ff806751325c5838c5840e045c8213fbba53979750fe8b7e08c07de7d6ee7fae325205717d1e6c313fdb2cf7a1 (encrypted)