# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
ac3e7c1fc1dcab3c020817fab3ed0c541405ae474d1691de631d85f59287ed13
Pseudo Output
a6354fa026b09544df61beb503174358b1ab8bd5095eb53d520bffbb2d6d840c
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
500d456579658d14b8732f3a1442a317c29c4d3c2301ed3dd47dfce528af226e
Commitment
600d89e0a6bac187379095d249f6f8f721532b6a16ee0ef06039819e364b060c
Range Proof
672 bytes (Bulletproof)
Memo
6923f6b5d70dce7d156b297c7cf1bcdc5a5573f233e6d5c4f96bb7a1ca13fa70d01f7cfdc26604f2b7ab754a29e93ef5076d777c0063ff219b5e2611d01c39bfed02c52f7e144376b35eb482271c7cb6d37451dd9f6cc65ac2bca151d9e27b9367b150406a6c44c271bc55113462e08bfede223225cb23590674148c3a7ac5db (encrypted)
Stealth Address
b83852c54dc5e5b6e2e83e162355fb851d1b85a7195157db572cfa1f54b54767
Commitment
3a5a57292179fbd798b77242a9762af90a206046bcb643f87199f1e49014041c
Range Proof
672 bytes (Bulletproof)
Memo
c70b0a431c22e3d60d28b2a8b0a48b8cb9d76f598ab88a717c628cbd2bb680630587729f7522b6f53f63fa30e92f750bff858823ede1213d69e1d1289f3ba027415c999421edbca1b69f0d23e8f1bdebb50e0390c5bb044e7485496ce2c2526973bd3f390244fd408705f3ff269a7eace4e79a3d0f7a911aca2bc4dbdfc0fc66 (encrypted)
Stealth Address
a460e1f600f5d898e552deb3a949375228ef3a2278c97371a34bfb26e4cea026
Commitment
30f8e5095d794a2be73b4f65c853d6dee66fefa0fedf46ebff28d7c60a683c5e
Range Proof
672 bytes (Bulletproof)
Memo
aa07be093786e82a7a6dc637d108bf46c1f82e1dbe979bb4b39e87e9bc2ff761c3aee876c0b2af85a4da5cb73124aab199477d70aa53b248e34be784c682372601b01480d2fb8b50ae821ab735cdaa6aee9dfe8ccf6486ce63097e3de702957ce0a95f64a033886a2e22a846f3abdd667a04de75421350abbe05f55f2a44f2d5 (encrypted)