# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
9cc0c7056eba1e365830d7c846c70006b531094be28f5c9d23d1da85c4b6a414
Pseudo Output
84d0a7524bb897a09c2b03c450d81bad82cf322111dd3277876745d714b55465
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
48aae0f2bd5655a6a8fd81baa31bb3894f34e4c22a37ec53834610c701a25942
Commitment
f8987698f0725f228c45f60db9cfa21bbbb671b98a785618573cfc5af8cf0561
Range Proof
672 bytes (Bulletproof)
Memo
108e4ae9f5058dc5744fee55886fa56fe8b5f47f44a879f8d110f0f23a4fb6f312d3d0e9d06d348325f62871a69f101206ed1302d01dc287ae47bea3e45d00034ff0ba6be85db211cd9f46009e7ea474e2124e15fc3128531aee862a8f001e3a04d87b46c2e0c34e36eb89af2dad0f2ce30a1bce087a2a2e75dd2de53707ec34 (encrypted)
Stealth Address
d42f9d63f610b6da6339ca0f529e6274bd92fd63a103cae1ecdc9cef0bc00424
Commitment
a60da87700f4cc67abcac3070c215717e735779be54b8be4750f77f74d1b3b4b
Range Proof
672 bytes (Bulletproof)
Memo
66d81d24f16a1af71a54e03ba5edec05d0dbbc1977c07be40371d6cbad19b29e904512d0ebce3136bf3ee029eaa0a9ad3d636c8252d79361d418b3d7fa03f514d747b716eced860c1dc051ea6eb0bd9e3fb0d3536dd82cc9df0caba8e1971512e38849dea1f673939fea1c152f648db3dda53b10e72c6653f730e87f228b360f (encrypted)
Stealth Address
680da4d759154d8aa347bee5e33ab20897405e186f3fd43f924b1bbca1ba8e2e
Commitment
ba3f2a7c6da2527cbf29a6a4b0009fa343929cee1fcab243ae33b56d18549603
Range Proof
672 bytes (Bulletproof)
Memo
a708c3d4261bc24ab2390cd7973d6b7034a2d467a50f85d0fec74fb0077f1f1169500f4f15af32944420ea469974bfff045daa78cf59a3030e9bd8a2cfd60a22d57aed43024f69125ed603d11e5c9525a97401cfb90bab1debe5a0107ff291e8fe4699a6ce611c599c6084a55019d0ab359590e00740c1a4112ba06f67e6b422 (encrypted)