# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
50b308c99aa6322faa529e4e2299cfcfe248e48df03b86ed6b155fa3edbf471b
Pseudo Output
ec07f59a0b05262615bda3186fc7d210edb4542ff20661e106af47f09e010a5a
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
5e866e48a48909d7ed8ec46589e2989c2ede3b6ca9561f84f8e3976bd26b9939
Commitment
8451884689b23cbbc7248a115ad4b421d1bcba9a4541d3d5f4eed897e39fdb1e
Range Proof
672 bytes (Bulletproof)
Memo
5fe09f1f1274b74cd276bfdd6e9e8d4dc78c1679f47db6131cbb5e392d0e20761c3e94b1958613ace0175e56c8555297ab34ebb202a0bb8f8d3ccbf6fbc54cd70cd98e0421d8a44aa1826d410536df8ff7564a0244de0698ff7791862bec01cb4ffcc9edfa520fee9d88f3be9683610e059c6e7d49fa952f5b441ad745164ac8 (encrypted)
Stealth Address
72202f46668fcc25ab588c18e1cf055cf7eefaf8c32221aad7a5bc5764adf427
Commitment
9e537e875ef949c93e0186621d5a721c283070d9d3f60ac61877bc23c561bd28
Range Proof
672 bytes (Bulletproof)
Memo
dc569b0b3f2df4629dc749a265e21e6507b4aaf00424c4c5d3842916da7e1862994fdcc886a61d0dd245af8e98fad0c62fb0181b16a4dae3f0507967ae79d295a94be6c1fc63e3a714e5514ae2be9ad562a88570b6636a8f1e7b2095d904473777ae3cdf145b14fd74c5ce794f4154c3ccf9ea1c27a7e3d08841ca434cea6d69 (encrypted)
Stealth Address
a693d6e55821f65080c4e1b847943b45614236c4ee59d743f57593cf47be565f
Commitment
e09ede934d02573616c97380c6315a3fa679f77ee4fe507e30ee0468ea70fa23
Range Proof
672 bytes (Bulletproof)
Memo
49648122d21e9079f8ae590fb35b68b75d7f100d4201aa7f400641d21ffc4dc168fe2a4a7e9b70d19611ba20ff0a39bc7706d083cd2f491e40b2d522d2060145be6eaf69d840199989e6ad4253395e534bc5fabd9fe9445dc3cd2aaaf3507b7131e0330455665c8e904665778a0d0ed7fdff64f3072c4eb1ee6140aa704d5ed0 (encrypted)