# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
72423c8bce07822d42bd575b76d40119490a279c79a40ddbfe80d61c34a3d513
Pseudo Output
0a39ec2acca476a4b4b97bcfa03fe74004b59de44c0f4b6cd91dfc96a4eae00f
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
1899d14d138484f347fbbdf3d42da746da5deb9bfcb5b368a66d07ac10cdbe7b
Commitment
dac164a6127b6ea1dd0a55323fcb7651d1f2c94366043cee836d57334eb80e0c
Range Proof
672 bytes (Bulletproof)
Memo
0e8027b5eaa5504e7b353085ca4207739ea60139110c383eceb57c4315fe5d69883e18fa39dfb1caa6176ac04adab3c99525b56f2c4980f7f54cb6831742ff164e406686b4d59e531858a7418c60d8cdca569f2003cdbaf5bfc431932ccc6562b642b07c7efe941bc67aed310d5151e88a9a1b9a9e148daa080c2d936f293e69 (encrypted)
Stealth Address
e0a1f7a0efcd3e5550f78cad628f0b3f51681e50cb2b6330e410315b956fe27c
Commitment
04dc735ba5d71d7224bc004beeaabe218c54a91297678a6f34616588db3bd507
Range Proof
672 bytes (Bulletproof)
Memo
cff7043a4402508a9207bb10207ad3553077c09155a505d527cb92c71bcf480b680d528df09382929c396c23662fbbf8c1b2fb980abb80cddf62c7acc5ff39e8f49d6c996e42760c0b5821367bd5895f1f99a63b6d0fb92182fadcc2fe4b870140bf85f7aba7b1962b8688e1ca23485262ebac7b8beb2ced8b9c27cca967d2f0 (encrypted)
Stealth Address
86134dd648f24f1c6bbf379c5eb90253c7dda8fb72ea26aeb26047fd92b7b943
Commitment
b4901514dffcbcd5cafabf8d04c549c924bcbc57001fcaf55f68332e8bcf6221
Range Proof
672 bytes (Bulletproof)
Memo
1212a041ebabdf21934361cfbd5c6ab90f2536a95f0b5e2af445fbcfd31e82f31f3765efaeb40391efe1309819e482981185af353fc9fe4251b81ea875566dbdbbbb6fe8f7398a3bb5b39d0b31c524c6152045f5d3ac6e2d0005a9b7a636b03e5c1c126cf04390b30c751c00a8601526f6847b448e30d02b105b66a21e887bc2 (encrypted)