# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
b69e109e224603b339011bd7a575ceeb01ca8886dfaa11748746bced0125a76d
Pseudo Output
2689866b0428388f4ee1fe7d02305f0458ccbda280ef2028497963e8b7ac0b54
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
906c171c5ed2d29328b0bdda0fe0462002e1aa4dbae1cce0db7d7bfb0ba88f6b
Commitment
98bbfa3eefaef5f09e8f4972042ec37bf61d9152ac998db246c1dd0654e5104b
Range Proof
672 bytes (Bulletproof)
Memo
a49fad6e7debeadf6d1667476b9638f58f859edee668e20486d3e8e7aecc72497d6e1b5257af360f260706aa1c11e9741d140053f34b0ccdce39af4876b59807ecd30f29ac31a2718d993dc3724febb7778b529376218ab731fb3157ea9ea9f6388bf78c7d116cef207b2e8530ee77ee0829e9254410beb560448e8d47df113c (encrypted)
Stealth Address
bc1350042e31b225922aed8b4d63e5cf9943e9d166160f19464f1887ff85c715
Commitment
3a1001e544f91d5e9648d6e2ed7649d0e9fb8c343ddd7761fe15415754171a24
Range Proof
672 bytes (Bulletproof)
Memo
67e638fa41efa9146db97161b78293a4ce723906f2c4690dad966bd21520fb1612ef47748db060c062a0ba301e17be7ee0c4a313810249686632abd1d4c8bc73258be7656555ad59478567d1c2c6cc273385458e15967f4e69546bb7b1fc1db5412e643df329661dbe88332478834144d337d1733a1f95c2e3f23cf52dc93233 (encrypted)
Stealth Address
96913e66fda2a7fae466135c484e394584c818773379d5000e6e67564ba9b723
Commitment
9058e98a4388772e26f8128041e6b5f5c15f1737271a2b2e6b5ef4ebe75b3822
Range Proof
672 bytes (Bulletproof)
Memo
561413a7f34ab1bfbc3f492d70686aff11eb7f77a821e1983f3da78cd50b2fb0a3b9c7762c80e9252b56c1a148dec12e20b21d410bd628b4fbf614667512b5f409b1d5a7c070b894a7359ad7ff186b6b83262aedd3289f63c83cf044915b245e7e6082c56fed99f7e564faac559440b3940e4d9b9182b002bf9bde2ab0da94fd (encrypted)