# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
007f723e3c9ba016b1d49c95213151b5e5d08ccd84a9b7e0cc55d6d53a8b851a
Pseudo Output
d8c438de0f4bc08ce79d2bbe0f1cff29a0e48e8f82d2635a5449c5356a2eeb08
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
e8be5bb3a2a8f4acc141885008b0ea194db2bfa04d113d05000ab1ca2325ad7b
Commitment
0804660e9fa4b9d53a2b4ea35562a1a27b201e4e3f04612986334101b9552b7c
Range Proof
672 bytes (Bulletproof)
Memo
1a73792bfd5c6a87ef4f604b63f8cb4f0c77c326363a16aeb02e4b1b14adcf6229757ec94d3ffcc567415ee1e7f85c969e175f2034267ee9ade322309229b535c53ce1473f32dfd3e95605609c363569b19ace7b0d87a4418a7c81caca488529f2694d6295bd86ced16d90b2cff14fe18ea3a4c586e03d7e21a8da8486f0fa41 (encrypted)
Stealth Address
90889ffb8bd88892a6c7f8a48a4efc45fe16fb6010f329d7a97f9a756d9f0f15
Commitment
4c0ce21894816d1aec6e2f11ac382cd4bf49c949a729e244cde5688fa028a152
Range Proof
672 bytes (Bulletproof)
Memo
fd222e70236556f6efdce6e4c54bfd4621ac35a3ca1d10507285b5dc24b6303ddfe7d0ff6d2b69d1ae2bc59b85b4a8c999c9628b1d4d44582df9510694a2f5b6179b9983d2dd68b7fa6c24364be5611d32f409bf9ad8630ab3136a2eb7a7b040917aa4b3b89131af5db0749c1c7cd58fa18c5164ff30c837935512fb0b6a58dd (encrypted)
Stealth Address
b8087849a80af49c99264df6b36484c5833c8d6982eccee34eb5b7e71fccc907
Commitment
e0a97df2d021c2c8182ba9f09538ec0afd990b904ff6f10ab32f4f3b0aa78a73
Range Proof
672 bytes (Bulletproof)
Memo
e7d8ef7e6930864254983a29dc5523e02209cb5e845bd658b2f81a358211fba9ff5d4221b7fa3e6393f33cf2c2cf868061eec6af842c62e38a8308ece65391b249192b88c759983439a3b62815b453f248b01ebe07e3a85b4faea068a30b0082b67da9130de54031ad6af07d3e21e4b9d483a6c9db9d9706345639b74b07f6f0 (encrypted)