# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
443e41d07877295870060fc8efb4a446fe9738856411cc14a165c0453e58255f
Pseudo Output
68c81bbf6c380cdc66b2feadbe8f807852f013451bee262b25d8c9ed5bc7fb00
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
9aa4cd307edd01d07ef05f21eabec08073970b5dc0b216aaeb8a3f52e533717e
Commitment
462edad7c448749464d2be34f27ba74d0ab5766185d0ab3ed3d4a539e129452e
Range Proof
672 bytes (Bulletproof)
Memo
6162f1b754979bbbfd4133441b76d920398b0f8d01f3886f4034c9c4a86c56f9bce5bdacd73b035908631e66ad0385158876c90159dcd7dea7618e81c29458a0d6633eb9a5465ba7b83e4fb860ce69c45f590741eaa263aac9996401dc0958a506ca54a47d93e42614c7dac7b0d8f9db407e7d43f6b841bb0a317077940833a6 (encrypted)
Stealth Address
1ed2a2afbed20fdd293c34784ebef067ebddfb15899537cedb364e8c96d65051
Commitment
2eacf507380b090279c02d4aedefe61b1940638c38ac0b9cb8a012b5ba867a4c
Range Proof
672 bytes (Bulletproof)
Memo
5bab9b84a8e414f922b994c9b4dff08c799a6bb4687b9fd3bfda24dbb303b065fa0384bf3650901461b4fbd81552264926c8ba1ee80bf244a9bab21aa0e7c3e0aec677e4ea5bf344c5afe48c6144f4cd68fb18ee76c5cfe2f04c7c18abbb4e649ca40026f5ab10c0396a2ecebb54003e0158c7b446ff4e3c7ecfa1046f3f9203 (encrypted)
Stealth Address
c26b41fea56b94bfcc0fb1ffc668e98c5367c2690875d78f6d3a4e2e1040d053
Commitment
0673ad4d6c54caed586825030899c1c591ffaa3cc05187c19a0096d90f976466
Range Proof
672 bytes (Bulletproof)
Memo
1000990a237c65f2bda35a4d90bcc517e9e463fc39e26f5455a81d471b23ea0d545d3cc3ec3614c0644b9734f152f145b7d34d841ca476daa41627558049262f1581f290d037b5e0accbdb55e491559afe4eeb95bd38f8c448f8a8f846f35d5b2aff8c52dd894eb973f35295643fafde285d8504802731555f8e472e0b6f6a05 (encrypted)