# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
90936638c709abc5224b94cd961075e720356d38f7372df4c1c614b5ccbb916a
Pseudo Output
08173f032e2c8b0e81c1cf3ab088ff5e99c9e265fd797d608b35356f3030df54
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
a48619874c03ba71257b1b8a7e93f54d398a18a0da97673bc99a0f66c0ed105c
Commitment
9a6867bad4b0f05ef2f9d6f8c414b9cf7036f2e27ee3726ca2ef5856b9dd1a79
Range Proof
672 bytes (Bulletproof)
Memo
c37f3ee6f3e8cba9392cfe28ba82d14ebe4085c6489c413037deaf71d5b781fe0f4c0695902a9af2021da13f179e1772bf2fa1f8c17d03be8c0b9c5a161df46327160578595b0a00455f7b5edc8694ad5c22dece9a7e6eddc3c98489cb4d5ef2d9fd932aeb0486acf1ec7976ad8d0208244d393025331214847e95cf6fe681ca (encrypted)
Stealth Address
9830744ba25b76eb0e89b0cc82fafb128469c176bd42084a605b560e5f43233a
Commitment
fc31b9ddf139d4622579211795517da1a814e0fc9fd942c95d86e69706fdf743
Range Proof
672 bytes (Bulletproof)
Memo
d16151350be4a58b6503da86a1a0a2a6d4b055be36d6b7c5fb4e6d0257eec5fc31fab5bf8ec825b091b576fff24a780e898b9f0decb009588f5f4c8fec0f29b858b23c39bb00c28d632cc961a47f2f9ae62ba2130748c02a83ea91a0c40f02c40da5e53521e2d4a5c8d894b3b5ead5247bc44ac5f449207c490fc71d0a37f11c (encrypted)
Stealth Address
7297c7de474ac96be4184c29971bb9e1a60560e42294041cb817a0261300b10a
Commitment
10ac976e04ad7c123126a74c5a109b923849683785e274ea2fc0bdb5c6e91840
Range Proof
672 bytes (Bulletproof)
Memo
2dac2d4ae4b608625cece60ebc5bb9f11ed647d24235c16d45b512be46f77a847514d002070a47ac8ff8d5769dff452677ac9d16ef9d9509d1e62cc1f6da5d4e8c0634c904a655febaf6a90be655f3c9432c1c0560da12947b5e80e0f8fbfafe0dfa18e189db3856bd5c8d65e9d0f85de15a783253085eee463ad1a23e5e078a (encrypted)