# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
3a9544bfedfbc65145d55058f1aa4e01836733920c328f8cc3a569428b47da33
Pseudo Output
607f2927ed329c4453ed0d90d73f37a35d2e0844a8c071808855d32e61db564f
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
9eab94ccb68a818d82fe6a80d69815987a48c83e857a214db789d8f278871079
Commitment
ce04fe2871bc66a8d6912812b8c2410d36a818097c68f9084d7027a9bfe68708
Range Proof
672 bytes (Bulletproof)
Memo
93e7409f191c60d83a473cebfe4aa9d4b51959211c19e42d6a546e9fb3de79b24bd4f7e27ac431ba84b22a2d2ecef76ec7438000cdb92360a7dd33a8d2d04b800341604a2099e4de8222c21cb5071f4f203cdc1b315597743055d090e6bc323c5b65b70dd1994a8299fe4bb89cd1b8c8d9eda665d0ef27f848524871a37e21a4 (encrypted)
Stealth Address
8c47ae46da6f6fe06f12f4302bd235ce29f9113f4866ae4862253dbc64bdbd04
Commitment
fa9b3efa9fec1daa0159259efba30506ce6af71f093e1ffe622b6ca5f7699f4f
Range Proof
672 bytes (Bulletproof)
Memo
2595af56f8afdf6b1dd813d2e2ce092229a0f7d69519923fe0499826492d6e91d5fc0f42ec7891e3d1d7ae45eea117389069fa4c16f6558778ac1c7a1a483734f27d0024b9cd0f0a030de8f8aaec6b2934c1db7600286649124e617539d29047d9e60cddf7a83c25b844f3f62b8d8162ccb7bad7fdce67692a37a3fcd971b945 (encrypted)
Stealth Address
bc23073abfae5a31d1b432112ea3b870de6c25bb9ebaf05cf4a419a0d65a5a00
Commitment
4e1d18d91b452d9f3f324f9c283757e099b2c6777c050ca08631855e6a1d8215
Range Proof
672 bytes (Bulletproof)
Memo
6284b6cbaba4b5e2f6f2bbf34d0f7c33de361246131b844eff81887111885f81ed1763f8b49c2976b90c640e8eafda9a0c64bae14d4b105e0c023b9bc548705228b76fac316a46d22b66859a1574cb34423eed08d0effae3ea1750bc5370d56587f5014d7151ebe486ea592a2a98ed1e616b292240c29cc6b6aa5724906ce514 (encrypted)