# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
dc2936de379a9a3069f70553c7af07109316edb083d96d0330395a24ee3dbd6f
Pseudo Output
909700d783c21103be17ff7a681428980f71f2f85a023faf4ce1190bf0146a61
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
f8e7e52c99f34e4b0d870a04923687a257a5b55716afa4b2a545d95eaea66d48
Commitment
00f3afc623d18a13e3306ceed17520ca03820e05210ace98f0cd1a7afd417a3d
Range Proof
672 bytes (Bulletproof)
Memo
35f5c43c653375953c95930f2645a338cfd389a72565f4609bb61d6501a3399e070b9cf4a499ad362a18cec7cdbf386a105045b8fd475fbc4a72f221f6af8f025fc6fa12cc8fbe5d2a62b5a1cbf74fa724a8e2aef6678a3455b8d8f4759258b7ef5567f85e026156f815b2c53c09605dff29b03f2e95a46f9d576399e6e9eeda (encrypted)
Stealth Address
7a4905ec4351e8256af293f20acc029de9bbe3d3ff3a4a9171032a9c6b812736
Commitment
0e49f1f80930952251e12b4fa56b78f583f438bb04a8a0591f9a0a9b390b710b
Range Proof
672 bytes (Bulletproof)
Memo
b05aa21f66701ae09b77b2ad38af4a011ee0aceb391bcdbf8d10f9a12a55844c45a00d4bc897da924eb4f8c5ba3f2d80fdd3b5db72a65b61981cdda63592b4cf0c682d97741a1f840dd80fca78d68ac14d334fc899ab908f0edb2bbd3f8776e3c27108a12f4fe5054f5621f6c3dcf42b5a4f5ebccbe60fbbda0691d279dd7fa1 (encrypted)
Stealth Address
a02a58df51ddfe81ba34e98e192ca2078e275a02a0699a80a23cee2a8c425708
Commitment
e47e650209bbf665bb8fc8eab67f9be541a2728788f6a99c403a9eb0ce2fb709
Range Proof
672 bytes (Bulletproof)
Memo
8b19e150a35d6704a27199c9577eabd44fc876298d1792eb05226919363e1a8692d7838e3e02471f481aeab486ea45d9243a8d3aa5ee2252c1ca286872c6f3c3b5834500043eaf0c041cb5a89759c0fdf0adbd3f4e95e27e81bf2051a6276fea5298576ef87ec934337219821c964e936d7a93b502e35fff4af0170599095f46 (encrypted)