# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
a07cbf7e189d8e928b7858d661b7aff4520bd47446c94f02549037fb53864d47
Pseudo Output
c8b85eacf13c3d525d05dfea09930b02a088b5d759a5b8cf7ebab029aca73148
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
fe549f9aeb5754631d75d52e2db7e797d1b76fa352aea22657fbc259f0925846
Commitment
4a4ac07692fc549d1b8542c3f9314160529190a785260e607c5a3ed6bee4286c
Range Proof
672 bytes (Bulletproof)
Memo
601e903cfe30e5aad5c9c9f6aa1b6bbd5af0a14a1112504e490c72599778d1d58e9595adcf10e074973f0b83bf632290cf3e2228a0f15a24ff57ae4a0989cde45e625e7d69107086726dbbf7865a315eedb27a3ee2d831282c14e86b198326c6e44d65a29a4fc1a10e01838e46a34728c639f94b63093f71b5f26b924fc9248d (encrypted)
Stealth Address
28b945d0d81ad3a7d31d5cf0c14d9f7c050e99213d6823c7b2f0279217034056
Commitment
0a069a52e763cacd919b70506351b16878fe29340ac076ebdb027aca8894e52e
Range Proof
672 bytes (Bulletproof)
Memo
d3a83010ac41315fe3cd692dde007cfae5145c92d20fe7fa7fe8372af7be86c8e1b074c7c83551108fee63a9d3935adb756ee25d4359e5de61e70b4f20721f65ef3ac78a3013fa020e522f087b7e147321a1fdfc963a27265f869d8289c8b1ce8d1cc3e05ae9b85775c9231cb00c25e8d483a37bb07591a93f88b63a96305ce6 (encrypted)
Stealth Address
b269a329b22b1b475334a377f94ce1a519631b50ff2086fc88d3c4a9ece1c278
Commitment
c40dc56f01f1bdf660871fdfd036654b9b28a0c9e6c0b8a5be93076e7f083d03
Range Proof
672 bytes (Bulletproof)
Memo
ae9cc330263b3dbf10d8a7a25f1e1b55947a51a64de1f36cceb1f1979eb63c1fc7be19f9b7fef23437ac57c3b622c6d8207873cc78df16c1f0f9d480eee6b6cc5656f5e53f8290178f4d4dd6128d342fe7ace64749313e2ec86635d8cfbd3f2bcdc6d50ade98b7b831e72e449e680691bc168d875b38b618c554522c41c30e6d (encrypted)