# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
d03829c956112c47a76c3bc6cf08efa337ca1cf39bddc39b1e35a03471f9f623
Pseudo Output
842775134a813ea567362a4aef74c24e490ef0cb5487983e88645df5e90da926
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
a4d5f0ebf20e981080371ed87ac17441644f152546344759ecd5b875342aa609
Commitment
0e20f188cddfbdfe4faf1496f9dde14e9fda42b7a1d8da8ab54f95452ac3eb29
Range Proof
672 bytes (Bulletproof)
Memo
fee77479429434e92efe9e754a9ca9530fe438b51050b81eb4bc70b92c6d7ab73f47afd21a21bc467e95bd4cf704d2bd821e893010d071f9a32b13367301544d34bdae3452a04757cdd5fd5c970234a1ed7fa2a113636a514c1c670d79ca5210f5aa5f5f8eff252eda8d0aebe270e7b91853826042d4a321bc6aaea6dfd7e5f8 (encrypted)
Stealth Address
3eab5c58341365af7acf1f96f09eb9f913ebd3ff7f72ee02d37a041f068fa066
Commitment
04d5cfa708965d56f305830a705c5d7a605a0a73dcd0f826616ec6e093fd8869
Range Proof
672 bytes (Bulletproof)
Memo
a6da620d5c2a9d2f85c709fdbe6a4c1f8e6f40dfdece11aaeb88e17d3df3df2cb921f2e313d5b82c02dd3fc0a99be50f74e7c01d1c6e78fa4a9b70ecae0348344ed64805dbfb55224a73af55866152d4098dba5b8f5290ac704947007dfc9f42a23a87f272b9a769679022514e132f9cf189ef7b1d297268646931ffe85ddb85 (encrypted)
Stealth Address
1cf3ff48d6e442af165cff0ac4e427b3e2725d45889300925db3421186729809
Commitment
5480746aa1b91d3962cec313fcb841ed2142a7e9ab1b5303c8df7d31c48ce740
Range Proof
672 bytes (Bulletproof)
Memo
13d8b94c274d8b06769521468902779305584d322a4e1ee2d19ecb4ac4a3cdd726b28020a95543de6c75dc6ddce44ccfcaa2e8c7eece1118a08c98d7b7ca90ed6aeacd5cf8099e28746f325b5e4ae08a87f530fb203abf109adc956707fb51835d2d259910ee98dc0c2ede51b4e417b5a94ba08b0545211e1cbbad4a5738c92b (encrypted)