# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
fad3efe3a292e537df8022c48f1aec14e35d15428c20850fcd37fddc58c21079
Pseudo Output
4490a469db54f83c6cd116a545640d81ee269e2bb9567bcb1802f996359ede2a
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
543bcbc44843cfc5b91faacca261c26d8f0294afe84a582b9e9e178d642ccc7c
Commitment
605701650156db5127c136b2a14a8556c020cecc168a1ae8a2b437bc8044ca71
Range Proof
672 bytes (Bulletproof)
Memo
d60edff23d9862ea5d94d7c1afe5a1ac6952653c9ab6c706805fb6a674e53967ee96b49ff83dfcae8f9d1697e4fee94f3d932b6a9be7134ccabffea4c7756c904381f38f589ad93ad2c6e5aa94749e2f197d60bb1c2b214294ef3efc13fe10bc747e4f069b80b064739a0d0d00d53df2bef2d41683abf38a4d48652f59da3913 (encrypted)
Stealth Address
aa046d49afd15bc1e83024446fb962765651e6d244be12020451ed10581fa674
Commitment
624440ceb356fb15f50990c029fcc501ae9eafef04e3d8f7a5fce912d2071757
Range Proof
672 bytes (Bulletproof)
Memo
5b596e3035d90dba19046e51162c9fbb8995e666e63c994efcb7f0b0b9756d34c645c6e57e3edcbea9efcbec8673cf3740be83e1d8a65202bcfaa53028817305ea8451c503f30b8c72c5dba605b58e95663339b154d039250a1fa5682437a81f2a25cf540be4c793e6d8b82e5710d439d473617cc30dd447c5ae31555a855a83 (encrypted)
Stealth Address
e4fa8cb9b52ed40c81eaacccf6ca3a838af3350b79d2c2c0b5527e087a064621
Commitment
4266c7bed9be76e17a86a64c793309a358ee570ac877d591463f056cdf92c877
Range Proof
672 bytes (Bulletproof)
Memo
1f2b4c315f7c05ea603de76a658a4689873b06d199ee9598c1b5d4c01289bc84fc652f8d903e31ee9070277ee062d2a96a3735d042b700336ddcd09b1f6d6dee0c2921e58c22abe9b33a1876d9d1176a171648828e05df0e287aee49239b703757114aa87adf6480a5db3497b85702fbac09aea9595631cefec287e1cb001f02 (encrypted)