# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
3a1b49f493c3d8f44fbf6fcb812bc0fbb1a8bc2999d226143c09c48d8db22553
Pseudo Output
deadac584a41a9078728ead3f792dd761302ac0fa6bfdc23713da58b8cdd5205
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
9050b5aa60f4214399f829ecf9d6a852d2acd9f0e0738fa7c5f0336def1c1f27
Commitment
a0f869d03bbbeaa6f2c3dd15fd52bda8adac953e6c82bdaa31dabeca518d5054
Range Proof
672 bytes (Bulletproof)
Memo
dc1006d491194a28d5bf18eadbc3c927da36f56416cf43212860b880b188218d4aa55f86a42eb7678893a567ed413b9870e5e68b9b06eed1a47c583bf2ca682cd920a7b4c4824d0ab8a83192739ccbd57f6e59ac873c3098b292398397a8556bcd269f28f20520e040af6787f7fa48d4f857ffb538766935da57ca7f765a26a5 (encrypted)
Stealth Address
566434eb101048e8ddd9a1725f74edbc501df708163d6518ee3e1c87531f3c7c
Commitment
44aff3e2805aaf0f80abb4eca528693c68df8ac6fc1cf292160d40c512a1cf74
Range Proof
672 bytes (Bulletproof)
Memo
4723a07a7c618a4ccc77f5afea03aece9dd0a3da30f9892bc205b8df3528f0757b201d6a7e55f38954f96650dad6657f29af48a9a07bd76d1bf17275763ecdd28016dd04149ef2ba1f833f7b78380ec4c36fd2648eeac62ee4e323f1c32e80d4252ed3d67d252c49020d6c35f6051267b32c8abbfdea31fa99eefa7afdc335fe (encrypted)
Stealth Address
227b56a5e39144f4aaeb1d5144cb3ef1318448879fbd8801d98d30dfb210540c
Commitment
58fcf953fd0e742b790b02a5e3015f90b0bedf31838d3f4185a13f951cd27750
Range Proof
672 bytes (Bulletproof)
Memo
20692ef24b8bb9708f938e9358045422233419c7b6a2447f63432bfb00a51f20b2d27ef6f133576bd154e37eeb907b762c406d29c236a34a8b821b95dc87313211569a91f7815917137dfd4ac7f3c32ef4d416a3dc1c9a331e62b38e93857af930348ae331bb5a5d57551e0f54a7f62e997ff44f391f6c939e2a5326b6dfc65f (encrypted)