# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
a43aac6ec0349abcb4aa44dcec79b9f7c45cc6629caf50d71db708cd28300c36
Pseudo Output
32493d5787104102d993693fda565d7001a24bbdec5fc50241cffb64aa9f3642
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
70075e4b302de9199991f385279289bd0dd5d1a7ff810cb55a24dd703d76ef6f
Commitment
8803dea1863f010046fd76a1b0e565f08b63c81bf2b5f88314962213bb50841e
Range Proof
672 bytes (Bulletproof)
Memo
80a86e7636b9ce17101b585eb1f91d5619f744d9e5b871ead1c1e1707cc0797d4e4a57e51b3e3a739b9881484be738e47c299cfbfc15ed9c96f6de3e8627d059d8a9af7220734f05ff067f932cc6188ec7e421034ba54257a8e555027a8fbdba42028f55d900049a8e5db430d5ea118c69d686aa66495c90e100ac06e89ecf37 (encrypted)
Stealth Address
88c2f2019a715aa9f6cff596035085d2d350e27d16ffaab91eac8c31232bdf04
Commitment
be53d07f747672b93530787ba6c0b81746173816ecc53ba26667bf10c27f8b0e
Range Proof
672 bytes (Bulletproof)
Memo
99b9af382b06e783722a8bd60387028a0c753273a9ebe97597e2421bee3c1ebb1837296d381ba41365b1f82d1a82ee20d9312d195d6d674a5948ec088ad8457dc5d2f5a08e9e144c41e6c5b6650201af5de3e2a006310def4a4578a171c5efef2bccc5fee0a6005fba4c858c3d92f81459a0b67a8ec481924c555f877acd49e3 (encrypted)
Stealth Address
a44d16df2416c0e9e7428fb9359b84166e3e184a7aaea799e6a8ca36b1724161
Commitment
dae6f59bf997afbff4bc2859f2542620f9ced180f2af54fc215e4e037e242d0c
Range Proof
672 bytes (Bulletproof)
Memo
d155aca0745e5ef1210677d6343784d51e02ea376dc05f59e18616e2605ba410b47266857f506e35637e3a9cacb440b3cbbb5f0aaf2fff62eff22721bbf0405867c8838c443a4be276465c1f51fd15097ad72da519a81648639abbfdd56786cec17b4f7c185c2c59d568777e5e398b9322f3887c1628e407e9d7a9e09b4a265a (encrypted)