# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
a0257cfdd88b5dd44016b6a189ea8111aac2fd26da4d845f288551a5d550ae47
Pseudo Output
443901b423cd2862aac5c0ba64bdc741fd08e99e1041b2687b7f4b6d73a6be2c
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
1434a0374f322be6c65dae842b6b5314f833318980d9adaf1d2055aa91e7cc32
Commitment
0a496fc43ac71d88757d3662b456d18a2b3fe11c16aef102828053f708710260
Range Proof
672 bytes (Bulletproof)
Memo
99ea03b31f01bcf807d161cd51887b50b7e582cc697aecf2f26349bfaf2d99230e035fdb2370ea4da62a177596b030ff95976051bacf1a2047ad75e55ac19d2aa665246108461de00cd0156f590b23943d1f008bc24d1b530436d18308ad20803f4144fb207237358e9631adc1041244eafd7c83f1e82770ae593b9dd4987555 (encrypted)
Stealth Address
08b411442f5ebd861398e098ca24fd89fb66418f383cf972e7b520b0f829df48
Commitment
4237a73b433762bf3f96f93a8ce540edecb4fa40ca578b782c19278faa7d2641
Range Proof
672 bytes (Bulletproof)
Memo
f3cb325fd6ab34bdcfb23cd14b48db45f51635d071a63e92fc3a471dd1c56f588b7faa9a3bb955d3b8e470b6044b5853e39eaf2811132805e7d7014e2c862e09b1f7adcf8dcd199e18763ea2a84afc5f068050cbbb8ac14c31ac23ec4a855432b9d10941e554078202b25c4465925a46dd8180dd2b2d35e9d003f06b7261899a (encrypted)
Stealth Address
8aea52f3bd9beabf80b7bcbcb6fed4aefbfcb9ea741b6e3a8249d5adc887fc3e
Commitment
9e6b742f100c7819d58b3984f80b4a6199617d998595658690b2784b8e36ff41
Range Proof
672 bytes (Bulletproof)
Memo
be781482d338736eefd33581d0277733ac5b40ccb6c79d27e399f5635615bdb3ec719afc7310b0f8833da63bd723dc43e288e432fbfbab8586e88ab8c528f24c43355658ab6a3e23bb1ea4dd759b590fc63510156284299a7a8a4d6da17760d5c55c2ca27b83b121bbedcd9cb0971ec9cf7edf15f6cefac4193459da9451ee10 (encrypted)