# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
543f2dcc9df883c55988256a873ba89c32ddefb397db7468d248dc0642b34c4a
Pseudo Output
9293f5b701de1c6c58487e40dd157dda9cbf4d58a26f51a47c05287614b0647d
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
047bb35fa01db0d9ed357e25eada409403fe59be224c19dee455baa759a31952
Commitment
c67f444ee068b46999aa5d852324efe27724d65b31f262048a4bae5a76c29611
Range Proof
672 bytes (Bulletproof)
Memo
9442a7766f416e9b4337cb25cd8533c633f17eb0c8a5aa5d38e4cf5c961b7386828f453dbc5ad23dcd1ef1d59e6e5c1ea08283cc09ba3842377a9a85761bf0de53f8e10479c53d9211320c7cdb4b48210222f63b038a92732619ffa8d7f986acfc50dea5aa8aa4ceae38faf758edd9d8498eca894cc77d33ca8fee730ff6b8fc (encrypted)
Stealth Address
0694cad77f4bd8c0494c8ff789368b9026429bd7e61a87f134fddee68a6f8138
Commitment
5091cd7d857800fd889f8c3b3f8b8e40cfe35969a1aa8a102929adfe01d9942a
Range Proof
672 bytes (Bulletproof)
Memo
52d294f6ecb0234d1fccf554fbb7bc177a2e8cd4034491b5395e964425c0c9999f0d2ecb2bf7add94915be9629261ab7e871abe4b8a3a00e4921c1324456b449e1f7117386e9e6c0de1562efbf0d0345f431f0a4d94e01ee1279f6bf8950077789bfaf313896be45e77535b2b8e9705742b2439c0b7bdd30d9b0b01bdf98a7ee (encrypted)
Stealth Address
46f50f218fabed14568f097f99aa9b7a002966e23f46b7f3ec4a6b8da667d460
Commitment
40d31360d18dbf24e19ce862c44fc4a9d548e5683f2585c80b6a285753416715
Range Proof
672 bytes (Bulletproof)
Memo
9a8599bfb95df2975f9645290d020bd8b30791b6bbf9f281d04576b4649b9af01fb206234f63bf2e75e3fb22cf7d51d2a8f507ad27e76ef193401d21518bbc1c4007b949e7b44b22717168d7f8757e067dc5f73eb94f6818a851cc30ccf5d7ea279c21312a5e7de81cd6f15c1e754f00a93f26029b013e24083c9c85ba0953e8 (encrypted)