# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
9efa6e354471eb55f390e2c7257514c413d9906724ae6ec1162bdd1ce744ae60
Pseudo Output
80138ded4d77048113b7e5c535d8e109ab18f6f84e223b3e50b6c4da4ee8481d
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
4a482045ad2a28058f4acd59b3e0103178f63302df7e246053bdc82fae291615
Commitment
9e23d555b3b5d216ab01e04cf112e8fe69d3ce28b293e8df25245b04cfa10f20
Range Proof
672 bytes (Bulletproof)
Memo
23edc04541c5d2ea3d283a4c367a2a5966ecf026b4b345eb419a1984f0062165cad4554edcfd15fbbb0f1c633a12dcaeb991daa9fec1d2a5ef60ddcd6d94093459d85171c6563978fc0d775455d670de28e6c6f7051c640c5cae18b5347d2b2856d7ec34b6c0925c51966be924da1e1189b3cdf32e820b402b7d33d43d0280af (encrypted)
Stealth Address
82b403fd54c8cd6cafaf74bb0e646119b6ef8ddac9ce48ee24efa19904faad55
Commitment
c21a4ac360b2154d975e9186a9ac9328992a45a81168ac910ad5131052918c25
Range Proof
672 bytes (Bulletproof)
Memo
0e9f10c519b5b1023ae3b8e30697f856771f1dc6e91ec301f76dcd571e718f2af404aabea1e8c7210fc6feea239ddaff294754033981ef02584e6e10a366a3f3b268efb100ee0f067d2e6a89a50a2537fb50d1daeff2c116366fee66980ea151062269823c6b8d20ef8208f9c5a7a7906dc612dcec9fd89d44f4ae226644dd7d (encrypted)
Stealth Address
4a0fc42471940b10a3ccd7f331ca7661bc76c1cd5e32a207655d212ae0b79f39
Commitment
bc9503373b6c4eeb6f50856a200f9826db82610873ee972b802dceabe2455a7b
Range Proof
672 bytes (Bulletproof)
Memo
544b5448d7011997e5e931703fb8d084cd43d1fe0d052e2de98f473a1df238ea0fa6d0d4b6d655e9827b1eaa70de1318daa95efe6b5da5adff948f45cc29904068dfdbd539fdcc64cc15b12fdc192d52bc4f076d9bf481d153541b16a667172847cdb79d9fcdbb2ddb9ff3323a4ad375e9157cc388223df2e82e5fa79dc038f2 (encrypted)