# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
842ae65f69a233c9e4aa9f3fdd303b604f779ef31993369449adf430089f6840
Pseudo Output
881e555f390b2d7222c9ef03fc51c6191eac2abc64cb1ffbd7ca165d4084802f
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
906c6f68d12acb312b833fdd1e0a3877e4da2243cd0892ad1b3d8d0999565c05
Commitment
92c0c3ef21436e5fc519b2375220730607cb1bf0df0e7f4d0f5acbadcad3c412
Range Proof
672 bytes (Bulletproof)
Memo
4888aa81646a7471c846fd7dba06e0179c5cf3070f8b226fa4eef99598510095260a8ed279c9e3abf166e18e369710564f7a6691e21c9b6d80c0503b28bcd0cc5cdeacc76537951dcdc4cfa5fb401b9e3baefed4167b7acf558175ee448a813f804c85b708914e210af511cfe91e549ad2b8011ba964d64915581e8296053905 (encrypted)
Stealth Address
5a00a112366db89c4e8204f87d69472f1ded402ac0ffb03e8333842589770055
Commitment
f473e5044bce5edd4b4e0b251e3aaa352cf35b40f9e9769401321b36ac357229
Range Proof
672 bytes (Bulletproof)
Memo
be54b06f9c79276123efde8605f9feab267cece1e3b40c8fb298b0317466ba72a6419d11cb340912b1646c156c49f1ea73a1383b04d8c7dc937a39e4f6e36ee7cfd25693170ec32184441b4cadc88e576f17d1a03a3191f4efe153057ef21b436e20b2f795e787bfb06dc80b636e039f509d9d36b051172e1f051ae9834c8dd9 (encrypted)
Stealth Address
8c5aa9bbc190f049440c090be4bff81482ed7f9170470dd1cad0c0a2b93ea779
Commitment
f82934a01db97c383708e84170588cb98e223c7a1a7b9abd7d7422decea5480d
Range Proof
672 bytes (Bulletproof)
Memo
05dd04ad42acc6bef946b1c8a8416fc4c4409e5abaf7b377225e401fe282c93be1df6bcea2dc1e5315bc7f1e6286a08474481539f13d944b19f8f86e5be9506680e98e914d8aff5370696003b50d24460318ed2d847add514b37bbfc757e50ec78da5157a7891823261f452704a1cef5b28d49e09db98c8f77870f5fc9c93e91 (encrypted)