# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
a84b687a5fd2ad2a2576050a9a9b861dee394dbad8afa2144dc24fc89da1f84b
Pseudo Output
5a03b46c1f20f2bc73fcc961f2f0c0068428bf233e501e94d6a191d96be4380a
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
1a496e3ffe76efde30186ece3558ffa6d799fc27dfb3fca885143884b9dcfc28
Commitment
3aa847a79ad686b0f38e412828a00735732b446dd983dd61f475fde1a638ae20
Range Proof
672 bytes (Bulletproof)
Memo
c5bfd32eb83e25f0855afa1ccb59093dd2c3f3c2ba46a6baf548137584154bcba87954706fe5805cbbda14f2cfcd0a9ad3a76c01dec2769a6ebfec764bd9509d9721bea9ec38cb944e321cb5753da6710661c60f3901455bb7030ef0a6b9b0e5f99a9104c51c22f5e02fb3170c143971fb2a0fb2a5afbeceeb26a3c53d775828 (encrypted)
Stealth Address
7ecfc103772501c91aaadfda5eaf0b12259624c1b4f4d9fdb84faba8291f4d02
Commitment
62d79a21b8004461656f7ec45a70f121ab86703f350fc235d69f70795a1da43b
Range Proof
672 bytes (Bulletproof)
Memo
2fdcf2d0b41a3132d4829f82c8cc958b67358998d749334c430598146db0b6d302d78fb38f92e9adf97058f8b09fd9d046fba9f3a306bfa1e64db3e6c735de3d3b9bdd8f5ab9517e5adcf395367765c402a716a58dce958946a4734d1bbd7cf89e74b883576c28f25c1c30f8a857d67e0b5eaed5dc898e8b3156db4e61e4e8f0 (encrypted)
Stealth Address
f06c83f6662779edd519ed473c15db82f439220fca0922ffddbf526d3bf55419
Commitment
9ec7c9d03628e18762747866b2e59483558197d3674be155f060dea60e53592b
Range Proof
672 bytes (Bulletproof)
Memo
107b92dfd8cfba96b81849d3f9b0150f2585c1c5e2a8434cbf6a52367a81a3120336e57d16b55e7cd9cbd6a641d4f63ef09eddae754e106788b8c06c3c9117a7b8556c4cfe2bdaa211891cc355b90c87efd23cf20d100560d598d12bd298a65926d81a9e1b476a51ce3a851bc606bfd4d6dcf39a6925eb80b2b4335670a29711 (encrypted)